General
-
Target
ce4d27f8271459cba8e5ee47c218a18ea818b38de6c42635decaed6c10e1c41d
-
Size
2.5MB
-
Sample
240624-bh26pswbmj
-
MD5
de9b7b1f668a33d19d8058706ba6c16e
-
SHA1
6f8d6b460e3cc74ecc97bf8eb73490c3498ff778
-
SHA256
ce4d27f8271459cba8e5ee47c218a18ea818b38de6c42635decaed6c10e1c41d
-
SHA512
5fc9d9d48aa29da2d0df0201dfe945a7f5354e00cf47204077c9b83da34ee1afb1b28ebcc73ddfc2823e76975a9844f5feeb334a56c5dec1d1d6d8eca3229427
-
SSDEEP
12288:vt0KKLaVTXQFIsx2Aa+jjtRgvWNcE3wiDeR01S5XxWfMb0:F0KKLaVTAFI42AbjLzN13wik2+0
Static task
static1
Behavioral task
behavioral1
Sample
ce4d27f8271459cba8e5ee47c218a18ea818b38de6c42635decaed6c10e1c41d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ce4d27f8271459cba8e5ee47c218a18ea818b38de6c42635decaed6c10e1c41d.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.oserfech.eu - Port:
587 - Username:
[email protected] - Password:
Epicoffice@2024 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.oserfech.eu - Port:
587 - Username:
[email protected] - Password:
Epicoffice@2024
Targets
-
-
Target
ce4d27f8271459cba8e5ee47c218a18ea818b38de6c42635decaed6c10e1c41d
-
Size
2.5MB
-
MD5
de9b7b1f668a33d19d8058706ba6c16e
-
SHA1
6f8d6b460e3cc74ecc97bf8eb73490c3498ff778
-
SHA256
ce4d27f8271459cba8e5ee47c218a18ea818b38de6c42635decaed6c10e1c41d
-
SHA512
5fc9d9d48aa29da2d0df0201dfe945a7f5354e00cf47204077c9b83da34ee1afb1b28ebcc73ddfc2823e76975a9844f5feeb334a56c5dec1d1d6d8eca3229427
-
SSDEEP
12288:vt0KKLaVTXQFIsx2Aa+jjtRgvWNcE3wiDeR01S5XxWfMb0:F0KKLaVTAFI42AbjLzN13wik2+0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1