General
-
Target
d0f6f994a785405b535ded1f308bb5fcd4f29e64760beb9b6bdfa229555a43a4
-
Size
1.1MB
-
Sample
250122-bp2hra1jdw
-
MD5
e9eb3a2bd0ba9891635c595cd7f86454
-
SHA1
e73f5b99255eac6b312876a0a3c070294f78fbfa
-
SHA256
d0f6f994a785405b535ded1f308bb5fcd4f29e64760beb9b6bdfa229555a43a4
-
SHA512
0d5e34d66797e97284de6248a40ad0b944e576d2d628d4822d9ee2303e63b257df61ec3c62f7e82406fc5ccee302b98b29dd8cd6fca03cec9bf58641aa2745d0
-
SSDEEP
24576:FO9Cm66XrzjnnpCp2lyk1CJ8+FrFIveDmpJ1+4YP4uCue:FazDpRA5GmABYPJCx
Static task
static1
Behavioral task
behavioral1
Sample
SOA - Payment Advise USD 18,709.00/SOA - Payment Advise USD 18,709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOA - Payment Advise USD 18,709.00/SOA - Payment Advise USD 18,709.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll280@@
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll280@@
Targets
-
-
Target
SOA - Payment Advise USD 18,709.00/SOA - Payment Advise USD 18,709.exe
-
Size
1.1MB
-
MD5
929b131dc33f70b2b765d8f2572a2801
-
SHA1
9d7168e1af408a364e5093214a89d3524c8e358e
-
SHA256
e3c29265116b650933ce33d627e11fd411c76c12d506864aeb4d352f34b3f27e
-
SHA512
fc68db6a62dfe940acf3e03ae94e0a0bf882d1256479cd4a7e0091f8c50a3da3f0149a6f5291c84252ee414160abe4195c5167fb2b00923f642dcd4e2fef3d3f
-
SSDEEP
24576:QcAag3fZjJnpcpQlyQ1cfW+15F2veZMpD1+2mv40CuD:QdBP7ADwmOVmvRC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1