Analysis
-
max time kernel
49s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
0f6c3316d8e397865d279f0d056f7400.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f6c3316d8e397865d279f0d056f7400.exe
Resource
win10v2004-20231215-en
General
-
Target
0f6c3316d8e397865d279f0d056f7400.exe
-
Size
1.2MB
-
MD5
0f6c3316d8e397865d279f0d056f7400
-
SHA1
f40fd41def34eb72e0b8d2eb791bd262bee63e8e
-
SHA256
de29548b44b77a507f9bd623c692f3a3a7322558aca93e0cef849b1b1d5e42e3
-
SHA512
f75a9fc28e4311e2255ae683906e5c632b72d30631700be8617cc103f06b2c20dcdce4750b60704c29cc5acb62884a7518895882e5ed96b0d3c854ef3a47cb1a
-
SSDEEP
24576:OgNWI9rafhKSxWQ6QAhCN5n19MQobQWV/Nm/y12Nhm3:ODIFafqQ6QuuI2yYI
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.jk-peru.com - Port:
587 - Username:
[email protected] - Password:
jkperu2014 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1876-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f6c3316d8e397865d279f0d056f7400.exe"C:\Users\Admin\AppData\Local\Temp\0f6c3316d8e397865d279f0d056f7400.exe"1⤵PID:1712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0f6c3316d8e397865d279f0d056f7400.exe"2⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\0f6c3316d8e397865d279f0d056f7400.exe"C:\Users\Admin\AppData\Local\Temp\0f6c3316d8e397865d279f0d056f7400.exe"2⤵PID:1876
-