General
-
Target
94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc.exe
-
Size
743KB
-
Sample
240726-e7485swhmq
-
MD5
86bf528a2f3b5313b407a0e30b3e8853
-
SHA1
c4982d6595860f665ab690509d858c9da2fe5c2a
-
SHA256
94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc
-
SHA512
c340f9c3108d5ae948bb70c6ecdfbf5cf2bae29c4cbc333c179acf9b782e8c8dacb624b339583be220a1d91d83e0b24a962dcf32a6509134e4a9a6ec341ebd5a
-
SSDEEP
12288:FYwEygw0UnKKekspijqztW6ouKjNuiFe6uKJHdWLtHb6N5xHe6OxvvY:Fqjiek2i606vKDFeWL2Hb6rx+6IvY
Static task
static1
Behavioral task
behavioral1
Sample
94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hrsportsgear.com - Port:
587 - Username:
[email protected] - Password:
Rana@22786 - Email To:
[email protected]
Targets
-
-
Target
94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc.exe
-
Size
743KB
-
MD5
86bf528a2f3b5313b407a0e30b3e8853
-
SHA1
c4982d6595860f665ab690509d858c9da2fe5c2a
-
SHA256
94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc
-
SHA512
c340f9c3108d5ae948bb70c6ecdfbf5cf2bae29c4cbc333c179acf9b782e8c8dacb624b339583be220a1d91d83e0b24a962dcf32a6509134e4a9a6ec341ebd5a
-
SSDEEP
12288:FYwEygw0UnKKekspijqztW6ouKjNuiFe6uKJHdWLtHb6N5xHe6OxvvY:Fqjiek2i606vKDFeWL2Hb6rx+6IvY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-