General
-
Target
63c6b7ec130ac5a74ae3c2067bcb5024c255462a6b00d2853859159c8b0c1d0c
-
Size
1.4MB
-
Sample
240829-hqm53sycra
-
MD5
ac8361126c13b4ea390c036af33e23e0
-
SHA1
0432aa5897b2e326911f07c58b8b471cfaa5e47d
-
SHA256
63c6b7ec130ac5a74ae3c2067bcb5024c255462a6b00d2853859159c8b0c1d0c
-
SHA512
d9867c19d175b54921ce427639ee61b8568c7bba6cfc9ba489162b3e63d8484c722b78c000a16c62333146c94be3d7bf1c6ce332b53fa8f199d9ea25cc7cd5a1
-
SSDEEP
12288:yJPTycOkS2xSqWfUTMErNMv1vDfXcM1+ltQJcOKvRnwLbl4YGVw:STyfRqrDMv1vsltQebOG3e
Static task
static1
Behavioral task
behavioral1
Sample
Ödeme Bildirimi.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Ödeme Bildirimi.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7041378796:AAE8c59sEoGb66PY7RqWPkvx-1dUpu0RsHs/
Targets
-
-
Target
Ödeme Bildirimi.exe
-
Size
810.6MB
-
MD5
a3f700514749f369f3507fdfa6bb3c65
-
SHA1
293d04cbbe7ad6ca487fcfd636d6958d56ef600c
-
SHA256
28786549dcee2c3cf67854e1101ffbd507b2223d8ae2dffa5a2590362e758e82
-
SHA512
299b1213126f2e0862d1d952ebcf24a8bf268364acf68524ae468694fe15bfe133d37a237b44a9da7b16387d98eb1023a534c2333122d0bc011a8042e67cddc5
-
SSDEEP
12288:hVVywOkU2xS62NUFME/fMv1vHXpcMh+RjQVcsavRrCLhlg202U3CC:9ywGR6DbMv1vyRjQKr4k1f3C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1