General
-
Target
96c1737c517af28f0052dc1e8fd59c810a38a5a7e7ba8f34dde8a5a48a0a4479
-
Size
619KB
-
Sample
240727-kbxr3sxakn
-
MD5
e8a03977c77c15086944d33d2bc7d640
-
SHA1
e59a7da521d4bd6bc33695079d1c474b6eb63127
-
SHA256
96c1737c517af28f0052dc1e8fd59c810a38a5a7e7ba8f34dde8a5a48a0a4479
-
SHA512
788b24b61d0170fd00ae47b6d03ff5f07c7bdfd117324a9e55b1a918a371514a74019912b8e87ad9c355bf61e31821baed24521c9e8b75f57e268e373822bfb4
-
SSDEEP
12288:PbsXlEBHxBKWqelKqIoariUM2HY5pLyp4JuHNimvUiwnN7RoMUp:PYXlEBqWqeMqIxrhHY5p2Rpci6Lol
Static task
static1
Behavioral task
behavioral1
Sample
cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0
Targets
-
-
Target
cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3.exe
-
Size
728KB
-
MD5
a0f74c405b615828045a96d6eb464f77
-
SHA1
f2acdcf38ad5293435576cd3b5827d53cd5baeed
-
SHA256
cc9372baeb26eb7513415fd8da130f514a1add9d50f8f8e02f893b23c6a1a1f3
-
SHA512
5e9ede6635cce98e9e39cbe91db8b37f9dbef8e8988db8e41b7458246402b8621fb9e6d451919fd03de7292b7bd3975656f16510624929470c4e726dfdf863e9
-
SSDEEP
12288:jDfm5EmnV+fLDdCL2IBQ3GfV6JJH+HwY+JFWm1CSjEXuTJ6ts5EH+uM:j65EmnVUhCaSQ3yV0Rg+rWm1CxuNdEM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1