General
-
Target
b4ce91bdb3336fef3434454007575635a36024c050cf580ce5ce7c162f97e0d3.exe
-
Size
1.7MB
-
Sample
250122-d2b5qswqaq
-
MD5
2c55963381999400a31814af76924bf9
-
SHA1
08865749b07b73a4b09a5ae23686b11f12d1e97b
-
SHA256
b4ce91bdb3336fef3434454007575635a36024c050cf580ce5ce7c162f97e0d3
-
SHA512
fac18cae326373fbbe961cda0d41f0906562a1a8528e36fad012ceaa3ccf932b4e8196a0cbe2100371dabe45e3a71fef8f050190b0c726dbba34cf9cf51584ce
-
SSDEEP
24576:ASexfdruzJDcQq/iFLpXq7TYA2rQtlHPI4Hs:dBz9qaFLVQB
Static task
static1
Behavioral task
behavioral1
Sample
b4ce91bdb3336fef3434454007575635a36024c050cf580ce5ce7c162f97e0d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ce91bdb3336fef3434454007575635a36024c050cf580ce5ce7c162f97e0d3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_dod - Password:
Doll900@@
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_dod - Password:
Doll900@@
Targets
-
-
Target
b4ce91bdb3336fef3434454007575635a36024c050cf580ce5ce7c162f97e0d3.exe
-
Size
1.7MB
-
MD5
2c55963381999400a31814af76924bf9
-
SHA1
08865749b07b73a4b09a5ae23686b11f12d1e97b
-
SHA256
b4ce91bdb3336fef3434454007575635a36024c050cf580ce5ce7c162f97e0d3
-
SHA512
fac18cae326373fbbe961cda0d41f0906562a1a8528e36fad012ceaa3ccf932b4e8196a0cbe2100371dabe45e3a71fef8f050190b0c726dbba34cf9cf51584ce
-
SSDEEP
24576:ASexfdruzJDcQq/iFLpXq7TYA2rQtlHPI4Hs:dBz9qaFLVQB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1