General
-
Target
77cf0bdfdd8de7940f4dcf0a6c6dcd38ed0114f0f5a7a2c8d3b514b717d2868e
-
Size
762KB
-
Sample
240907-22c9sszgln
-
MD5
01403a665af2b2e38e299aa4daf691a7
-
SHA1
a951b0192e7baff5481078bcaa522a07187001e4
-
SHA256
77cf0bdfdd8de7940f4dcf0a6c6dcd38ed0114f0f5a7a2c8d3b514b717d2868e
-
SHA512
5fe5ce8d07db825562693edf9f7c5b896229bae2de5878f36c64e48e0749fdc9bfba826c0ee9467163d542b7c7268638f3aab9776de2dd9ab33367edcf2f871a
-
SSDEEP
12288:zcrQtRn8fw46OcHnaIeOIliXD6HAU/la3b7yBBWR6aC2QBmlnatMnrFx63Hfv:z5nK6rnaI2liT6Hvwvy/V1anrP63H
Static task
static1
Behavioral task
behavioral1
Sample
77cf0bdfdd8de7940f4dcf0a6c6dcd38ed0114f0f5a7a2c8d3b514b717d2868e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77cf0bdfdd8de7940f4dcf0a6c6dcd38ed0114f0f5a7a2c8d3b514b717d2868e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bahar.co.ke - Port:
587 - Username:
[email protected] - Password:
@0792161600 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.bahar.co.ke - Port:
587 - Username:
[email protected] - Password:
@0792161600
Targets
-
-
Target
77cf0bdfdd8de7940f4dcf0a6c6dcd38ed0114f0f5a7a2c8d3b514b717d2868e
-
Size
762KB
-
MD5
01403a665af2b2e38e299aa4daf691a7
-
SHA1
a951b0192e7baff5481078bcaa522a07187001e4
-
SHA256
77cf0bdfdd8de7940f4dcf0a6c6dcd38ed0114f0f5a7a2c8d3b514b717d2868e
-
SHA512
5fe5ce8d07db825562693edf9f7c5b896229bae2de5878f36c64e48e0749fdc9bfba826c0ee9467163d542b7c7268638f3aab9776de2dd9ab33367edcf2f871a
-
SSDEEP
12288:zcrQtRn8fw46OcHnaIeOIliXD6HAU/la3b7yBBWR6aC2QBmlnatMnrFx63Hfv:z5nK6rnaI2liT6Hvwvy/V1anrP63H
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1