General
-
Target
f931f521332d9a8394aa9790e0cb942771cc98b6b131616ad503883ec570e573
-
Size
582KB
-
Sample
240831-rpdppaxhrd
-
MD5
5f78e7fb5fc53f8ca91a86658a7d215c
-
SHA1
c2d13cfe1161128c6a3b192765d13c992fb88abe
-
SHA256
f931f521332d9a8394aa9790e0cb942771cc98b6b131616ad503883ec570e573
-
SHA512
70a7e7b21f769ccc142cc3d70b2ee076986830b0bbd8c5daf5bad9e67770ac7b949ef7c606b80853a60fff2a96bcb6aad85bfa0d636b3af5996405399fc48c7e
-
SSDEEP
12288:u0E7QPhiPh/aNX8xvzlxc5wZmkIp9mKh1+5yWn1g5XGcQWlyWZlXtRuBrr:bUekdqCv4cmke7+dnKW0jZrRar
Static task
static1
Behavioral task
behavioral1
Sample
4b262f1bd085b52cf50d807380725e06f3728f34ca554c1b364cc88a58f55d8a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b262f1bd085b52cf50d807380725e06f3728f34ca554c1b364cc88a58f55d8a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.msjfurniturewll.com - Port:
587 - Username:
[email protected] - Password:
abc@1234!5 - Email To:
[email protected]
Targets
-
-
Target
4b262f1bd085b52cf50d807380725e06f3728f34ca554c1b364cc88a58f55d8a
-
Size
731KB
-
MD5
e1aaa1e3dec10d718e4e84910551a653
-
SHA1
7dd70ebbe1edcb54243f7121078b1d830d2c0037
-
SHA256
4b262f1bd085b52cf50d807380725e06f3728f34ca554c1b364cc88a58f55d8a
-
SHA512
a3628f9dbe9feaf7bbf1aae4a38798ebf811bbe9657c6df2866d1e355fa3200c3f6a69ebeb316ec65109b14e1a77d4967a83904fd168334e2f7d626410257616
-
SSDEEP
12288:jQKlh08OGQuZLvqJFTP8TQ/8SfwH5ADOfW3jCaFUmMKWOTevZHQxtnAZTrBhe43:4nGQYTqD/DwiKfW3j9UVvZHQTE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1