General
-
Target
b8f041d4d6e2727ebedbc73db180d3043f4dde649cf88303b838252e134c469f
-
Size
653KB
-
Sample
240904-r88n6ssdpq
-
MD5
50f4615fcc45ed39154e1b2688571f6a
-
SHA1
98a06c62812ae8ff3853814034c8968f7f79adfb
-
SHA256
b8f041d4d6e2727ebedbc73db180d3043f4dde649cf88303b838252e134c469f
-
SHA512
7ecfe0097e5c3eed9b5e764c5938080697ebe161e738b2d95f0cf651bce85bc06ebec1a41a20ac668451103a11fc05aa3726813dd9fedf5aea7606fd2cdf8a7d
-
SSDEEP
12288:NbrlnTG/ioORq/YZ2dqJfpNdKgsrgerYzAL/7bul7oV+DQ8EKnOfQ2iqo2c:hl8ioORo0JxxX49/ScVgEUH22
Static task
static1
Behavioral task
behavioral1
Sample
5474194c07b4f0b5144069d189cd55adfd2e9e8e89bbbdba6153e173a094ff42.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5474194c07b4f0b5144069d189cd55adfd2e9e8e89bbbdba6153e173a094ff42.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.alitextile.com - Port:
587 - Username:
[email protected] - Password:
Myname@321 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.alitextile.com - Port:
587 - Username:
[email protected] - Password:
Myname@321
Targets
-
-
Target
5474194c07b4f0b5144069d189cd55adfd2e9e8e89bbbdba6153e173a094ff42.exe
-
Size
705KB
-
MD5
8645375a86a6176bd04b81b91f03a1a6
-
SHA1
5e35f5830e5230e92270e71bdc901ac570cd7c19
-
SHA256
5474194c07b4f0b5144069d189cd55adfd2e9e8e89bbbdba6153e173a094ff42
-
SHA512
55227147571247e282821651a3c0097322bbad696e9a0fd63d15e968f882078987d4e4308458d77322a7ccbef51088b7d02468d6a9a7e55eef77d3190eb4fb00
-
SSDEEP
12288:y5fzk6jQUtGzdOTImOMZXggiUspKjDSy4AmjxSoLn6+1LkACCslHGBZXTrCyQdRR:SLQ1zCOiXg22y4Aex1gwslHGBdy3Rv6S
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1