General
-
Target
f1d4b66a8de9c9869e4014a798d36795cb43bdbcdefd795b87c7d3b066abaee1
-
Size
830KB
-
Sample
250126-3vthwazlfy
-
MD5
ece04954e038da7a62048350a31d9969
-
SHA1
7910b736eba404d999bda5c1d347ad3b8997beab
-
SHA256
f1d4b66a8de9c9869e4014a798d36795cb43bdbcdefd795b87c7d3b066abaee1
-
SHA512
5e8e9695e971027200eeec7911e88fae10dc78cde021f1ca33cd8af5f64db87f968c5480caeec544c268734d7e42b20cb25dd30a5a22bc10220e30d9cbf01835
-
SSDEEP
12288:oZ0zgO9uNUSYu4O+SH2S8mFGIne21f4dUkBya16LcrXgd/91D5YxNZ+:oM9uNUSYu3rHbBGIX1gJY26ArQ/9nYxu
Static task
static1
Behavioral task
behavioral1
Sample
Pre-Alert BOTNAY BAY V-1E/Pre-Alert BOTNAY BAY V-1E.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Pre-Alert BOTNAY BAY V-1E/Pre-Alert BOTNAY BAY V-1E.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll440@@
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll440@@
Targets
-
-
Target
Pre-Alert BOTNAY BAY V-1E/Pre-Alert BOTNAY BAY V-1E.exe
-
Size
1.7MB
-
MD5
4c80becc727130fae34c312295f56517
-
SHA1
d5aed4fa3fbf2994680c97b95a68eeb2e992fc65
-
SHA256
f2448e5b108286c840b6d8a283af1f980818d500dacf0f04a8b424cd70b6d442
-
SHA512
d0be51acb0e1a88523d2152054990d862972fc755ec647763707275828f97eccbcbd502b8ee43ae53a79d7018876f2f9a39ed3d1e9d5518604e57c4971480c86
-
SSDEEP
24576:CSexfdrBbi0T+IKztFBGDVXsgpriBWmSOe/E3vq6EsSV:X8fTBKz/0BNiBWmNesfq6Es
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1