General
-
Target
dc2e8a0f43a7ba9dc6ccf14dfda7e6ddd366d137cf774e221b09165ca6b414a8.exe
-
Size
649KB
-
Sample
240618-xyma3svdke
-
MD5
0c0a41c08e05cc17ec190a8325122ff1
-
SHA1
d626dadb8389d7d3a2ef8a4d55ea1e93012344df
-
SHA256
dc2e8a0f43a7ba9dc6ccf14dfda7e6ddd366d137cf774e221b09165ca6b414a8
-
SHA512
eedf165ebccb8a4c90664a4eaa8389aa7f67fd03035e3e3592dd8ebbcf0c4f67e2cc398ecf5838469721fffce7b511c74f2973632d065fef825ef15acc0ce5de
-
SSDEEP
12288:Fjgd/iFIsPAb/z/6U66JBBQILFuCJJ5JAl9qv+6Pt71rjzhO0dto9Vy9j+jtIU0Y:9gdkIKybs6J7QI8CJJgXqvdRrPs0dtDg
Static task
static1
Behavioral task
behavioral1
Sample
dc2e8a0f43a7ba9dc6ccf14dfda7e6ddd366d137cf774e221b09165ca6b414a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc2e8a0f43a7ba9dc6ccf14dfda7e6ddd366d137cf774e221b09165ca6b414a8.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.calibervalves.com - Port:
587 - Username:
[email protected] - Password:
f%K=]590_&Es - Email To:
[email protected]
Targets
-
-
Target
dc2e8a0f43a7ba9dc6ccf14dfda7e6ddd366d137cf774e221b09165ca6b414a8.exe
-
Size
649KB
-
MD5
0c0a41c08e05cc17ec190a8325122ff1
-
SHA1
d626dadb8389d7d3a2ef8a4d55ea1e93012344df
-
SHA256
dc2e8a0f43a7ba9dc6ccf14dfda7e6ddd366d137cf774e221b09165ca6b414a8
-
SHA512
eedf165ebccb8a4c90664a4eaa8389aa7f67fd03035e3e3592dd8ebbcf0c4f67e2cc398ecf5838469721fffce7b511c74f2973632d065fef825ef15acc0ce5de
-
SSDEEP
12288:Fjgd/iFIsPAb/z/6U66JBBQILFuCJJ5JAl9qv+6Pt71rjzhO0dto9Vy9j+jtIU0Y:9gdkIKybs6J7QI8CJJgXqvdRrPs0dtDg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1