General
-
Target
ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a.7z
-
Size
657KB
-
Sample
240911-lq1b7avbmd
-
MD5
9c4a181aa969c73e4f680031b2790a06
-
SHA1
8537083071d732ab2f0ebcd85d3c9f3e5e960fd2
-
SHA256
ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a
-
SHA512
573671d939622086213d471c4736ce2c04626f89f0cfedf345cad27ace3805b966d37fb24f3daa284fe36f9a5c7256af5f644211bfa8507d943f45f388e2af0b
-
SSDEEP
12288:NhAcV6Y8w8h1/95Y9b+esq/4MhN/u5fbKVmfRJuhOKTjCUoPTZ7V:NucV6Y8wyUK5q/L3m5WmfvuOKTjCUOV5
Static task
static1
Behavioral task
behavioral1
Sample
Plaston New PO 067476.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Plaston New PO 067476.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
Plaston New PO 067476.exe
-
Size
994KB
-
MD5
d30bb9df615a8d1661f843d426ff40eb
-
SHA1
4344e695b5f65917dc68f241ecde4b99cf25d930
-
SHA256
b54ee7375e7ea979d16b76f183aaaccfa49681e2bd748ffca202fde9cf823346
-
SHA512
44963c4b52eebb7c07d8cd9b2766faccc045dea166c76a479cdccbba06a9dc1a5b4be1003daed93b72f64f848497c3ae57be99501aa11d4569b30b7e7e26706c
-
SSDEEP
24576:OeTLGMbsHwgKQuF/WaW+Bsfvuo+YZSU11q:ONHQqDt+BcGodZSf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-