General
-
Target
fa3f2da36cc8ac6894d5484077cdc8c294fb22dba8860f87a0bbf20436a0fec3
-
Size
1.3MB
-
Sample
240906-mfkdna1ckk
-
MD5
78623a6de3bd639a7717ae5720fdac0d
-
SHA1
c564c812a2a7744c611427c2d1679d296858458f
-
SHA256
fa3f2da36cc8ac6894d5484077cdc8c294fb22dba8860f87a0bbf20436a0fec3
-
SHA512
38726e84f7f01b7e34dc973c417b3f54137748b0dbdeefaab710f9e515787b0af32c7fc95724bb12de26aab8527c54a13e95ca10d052df6951b98e18b0d2ae59
-
SSDEEP
12288:xMVV2Xec2cwvOjw3aVI/PE+vVg7fLz3Q1cLy/33lbxGN:xe2OcF05c+K7fLzA1zGN
Static task
static1
Behavioral task
behavioral1
Sample
fa3f2da36cc8ac6894d5484077cdc8c294fb22dba8860f87a0bbf20436a0fec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa3f2da36cc8ac6894d5484077cdc8c294fb22dba8860f87a0bbf20436a0fec3.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/
Targets
-
-
Target
fa3f2da36cc8ac6894d5484077cdc8c294fb22dba8860f87a0bbf20436a0fec3
-
Size
1.3MB
-
MD5
78623a6de3bd639a7717ae5720fdac0d
-
SHA1
c564c812a2a7744c611427c2d1679d296858458f
-
SHA256
fa3f2da36cc8ac6894d5484077cdc8c294fb22dba8860f87a0bbf20436a0fec3
-
SHA512
38726e84f7f01b7e34dc973c417b3f54137748b0dbdeefaab710f9e515787b0af32c7fc95724bb12de26aab8527c54a13e95ca10d052df6951b98e18b0d2ae59
-
SSDEEP
12288:xMVV2Xec2cwvOjw3aVI/PE+vVg7fLz3Q1cLy/33lbxGN:xe2OcF05c+K7fLzA1zGN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1