General
-
Target
09a98f098631c5fc63628ded72ed85e602b5609894ee1e2c976f85889394e513
-
Size
658KB
-
Sample
240822-jk9bssyfkq
-
MD5
f25445a391ac69fe67916bd3868837ff
-
SHA1
06a45b5e5fa14572060a12094dbcdf731e588157
-
SHA256
09a98f098631c5fc63628ded72ed85e602b5609894ee1e2c976f85889394e513
-
SHA512
e566b2ef76cb508552d386c22bbf7c37473853bdcfaae2f1af21113f5bbf86133a1fbb5824d6196f28582bcaa471e9767b0d1e34f2b6af3cec4e1c99aef47efa
-
SSDEEP
12288:ElY9s8cLNoLrPlCplhzBOUmbm8K5a4GET/uAhY+cjK4PYaVzagZ1Z:aY9LSNGlCpfzBOtK+vJWY+cj5PYaVzR9
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e-dekont_html.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Targets
-
-
Target
e-dekont_html.exe
-
Size
749KB
-
MD5
e1716a5c81232652625cb3a3fe727b92
-
SHA1
a3149b32cab6937b8b2439298677c76fddab6a1e
-
SHA256
584022a11fa25bc77ada9ec361c791001f8d8da848930b386f42841d9e0be7d6
-
SHA512
fa380191ea1ab43dc3c44a00b9905ec71685c747938138d71deb7876ddc8aef808ca4b24f836a155705378994cc191718aca74fe288eeabf6c1857162ddc0e71
-
SSDEEP
12288:ZQGDthDUYtqSfzHM8yKAevSdeBS+MjvxMIBcpvkzsBegS4NYRS0k29x:ZfDUYtqSrHM8yKAMSsvcsBvS6s1x
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1