General
-
Target
bf6bff1f8edd591c92bcbcf86ff6f82c114273e34a8475a17289936c93879e1d.exe
-
Size
699KB
-
Sample
240522-cr862shb95
-
MD5
aba11ed39d519dec06148a61662c1546
-
SHA1
cae54e2d63d7b688a433ef3e31bd80f066d9803f
-
SHA256
bf6bff1f8edd591c92bcbcf86ff6f82c114273e34a8475a17289936c93879e1d
-
SHA512
bee8d81e7ed7ee285c0d879dbbfb1f4bce7b0fba8666e77e3d7d65d3a06e30bcf882847183ca42ee936675ff43b2ef2c75836c1e2e0de2907d78753fbe3f9a4e
-
SSDEEP
12288:l0pei36R5ChoJgeeJw2KgygjhNRC7g27mIQUSJDhItsFIXGQ+j6lHSZXImBC:qpp36/ChoJ4Jwrlgj7R8gamIQCQIX/7o
Static task
static1
Behavioral task
behavioral1
Sample
bf6bff1f8edd591c92bcbcf86ff6f82c114273e34a8475a17289936c93879e1d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bf6bff1f8edd591c92bcbcf86ff6f82c114273e34a8475a17289936c93879e1d.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rodersaglik.com.tr - Port:
587 - Username:
[email protected] - Password:
Roder343* - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.rodersaglik.com.tr - Port:
587 - Username:
[email protected] - Password:
Roder343*
Targets
-
-
Target
bf6bff1f8edd591c92bcbcf86ff6f82c114273e34a8475a17289936c93879e1d.exe
-
Size
699KB
-
MD5
aba11ed39d519dec06148a61662c1546
-
SHA1
cae54e2d63d7b688a433ef3e31bd80f066d9803f
-
SHA256
bf6bff1f8edd591c92bcbcf86ff6f82c114273e34a8475a17289936c93879e1d
-
SHA512
bee8d81e7ed7ee285c0d879dbbfb1f4bce7b0fba8666e77e3d7d65d3a06e30bcf882847183ca42ee936675ff43b2ef2c75836c1e2e0de2907d78753fbe3f9a4e
-
SSDEEP
12288:l0pei36R5ChoJgeeJw2KgygjhNRC7g27mIQUSJDhItsFIXGQ+j6lHSZXImBC:qpp36/ChoJ4Jwrlgj7R8gamIQCQIX/7o
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Detects executables referencing many file transfer clients. Observed in information stealers
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-