General
-
Target
63250eb58503e8d669c6d31e5aa9ef9e4dea102c24807fdcd09b97d5133a9028
-
Size
723KB
-
Sample
240530-b7erpsbb38
-
MD5
f123bdf1fd66c12a072973ed4c4f6903
-
SHA1
d2280b51c067501c98a60bf0fc7e04ba15508991
-
SHA256
63250eb58503e8d669c6d31e5aa9ef9e4dea102c24807fdcd09b97d5133a9028
-
SHA512
dd0541740ae355f90cdb32efae9569304da913e10e283c61a8a0d072d0fe158a39c86debf438c755922bd7b71487534b2956c4a267d32c33d9abb8627ad7d86e
-
SSDEEP
12288:G+gboQ8dJS4VTKhjtrA07WMLVX1BDn+teYia4zlrkyOsqg7vE05YUvDk2pDM/Wuu:p9QqScTKV5AWLVFEteJa4zl4kRbEDUvH
Static task
static1
Behavioral task
behavioral1
Sample
63250eb58503e8d669c6d31e5aa9ef9e4dea102c24807fdcd09b97d5133a9028.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63250eb58503e8d669c6d31e5aa9ef9e4dea102c24807fdcd09b97d5133a9028.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.destinationtoplan.com - Port:
587 - Username:
[email protected] - Password:
payment@12345 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.destinationtoplan.com - Port:
587 - Username:
[email protected] - Password:
payment@12345
Targets
-
-
Target
63250eb58503e8d669c6d31e5aa9ef9e4dea102c24807fdcd09b97d5133a9028
-
Size
723KB
-
MD5
f123bdf1fd66c12a072973ed4c4f6903
-
SHA1
d2280b51c067501c98a60bf0fc7e04ba15508991
-
SHA256
63250eb58503e8d669c6d31e5aa9ef9e4dea102c24807fdcd09b97d5133a9028
-
SHA512
dd0541740ae355f90cdb32efae9569304da913e10e283c61a8a0d072d0fe158a39c86debf438c755922bd7b71487534b2956c4a267d32c33d9abb8627ad7d86e
-
SSDEEP
12288:G+gboQ8dJS4VTKhjtrA07WMLVX1BDn+teYia4zlrkyOsqg7vE05YUvDk2pDM/Wuu:p9QqScTKV5AWLVFEteJa4zl4kRbEDUvH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1