General
-
Target
ff97fec579778776ce97d2d0118bdae5.bin
-
Size
660KB
-
Sample
240904-cfmtnsshpp
-
MD5
de74c7dd9432abf26cba29d958cc518c
-
SHA1
2975c7f44f42cd4892bb86a3c4fab713332482e9
-
SHA256
e965c8f96a32d3a71b02ee3439a5380cd6b16280527aee55c926cb2634ed36e9
-
SHA512
bb089a771857f0499197a6a93026620c63ad0fda26dd5a7ee91935a2021bac602439d2506dac08b3fcdbeb29bfcb426499d3aced59d60abac3f1cf1c1a9f2abe
-
SSDEEP
12288:tjSLW/52HEHlK8PrVmnhfjjqpZXCdPighZ+ozmxUp:tBYgZVmncvCdPnzmg
Static task
static1
Behavioral task
behavioral1
Sample
b7d2cbbb89d8e19df00ca2912eed64113e334ae25e27151c384fe170f2d58def.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7d2cbbb89d8e19df00ca2912eed64113e334ae25e27151c384fe170f2d58def.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.cup.org.pk - Port:
587 - Username:
[email protected] - Password:
Cup@123#
Extracted
agenttesla
Protocol: smtp- Host:
mail.cup.org.pk - Port:
587 - Username:
[email protected] - Password:
Cup@123# - Email To:
[email protected]
Targets
-
-
Target
b7d2cbbb89d8e19df00ca2912eed64113e334ae25e27151c384fe170f2d58def.exe
-
Size
752KB
-
MD5
ff97fec579778776ce97d2d0118bdae5
-
SHA1
22914dbd72f9392dc7ebcdf96c3ea82547ff0dfe
-
SHA256
b7d2cbbb89d8e19df00ca2912eed64113e334ae25e27151c384fe170f2d58def
-
SHA512
4dfe864b296218f894f87a5df34110983a5429d6fd3900359230ebf23962420b28cd766dcdecf3b075134572a927e0f0313244b1e7f3f3f981c257712664bf5c
-
SSDEEP
12288:1wfLnnvchm2rbS1jpdNvCFjG172tqYOkoWFiKkIYLJ6UEQgVhhaHFw1GfCo/Tn:Wb0hmYbSdNKFjG1CaWFiK4E7VxoTn
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1