General
-
Target
Ds1m7vqeVcwZRKF.exe
-
Size
640KB
-
Sample
240917-r3xdysycnb
-
MD5
4a90f11d1d20d21bff2b39a6318323db
-
SHA1
c26d09b8004b6f9b1a3cbf9a1cf612f70344c0b6
-
SHA256
c33f479dbf220bcc94b3ec3b50291bcb563dd42be1c93f946b06d162ad913675
-
SHA512
c2cd0944c29216459797b06c6df9502402604a51c469e02d7383ad89399c7b792d60586781c71ada044a2456975f8561aa42258bc5477aa439283e5360fb9238
-
SSDEEP
12288:O6Fbylg0LO2zqsnelpU4DySbSDC2CrzQ2px4hiMEouh:Okag5w74HbIC2mwgMEnh
Static task
static1
Behavioral task
behavioral1
Sample
Ds1m7vqeVcwZRKF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Ds1m7vqeVcwZRKF.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb
Targets
-
-
Target
Ds1m7vqeVcwZRKF.exe
-
Size
640KB
-
MD5
4a90f11d1d20d21bff2b39a6318323db
-
SHA1
c26d09b8004b6f9b1a3cbf9a1cf612f70344c0b6
-
SHA256
c33f479dbf220bcc94b3ec3b50291bcb563dd42be1c93f946b06d162ad913675
-
SHA512
c2cd0944c29216459797b06c6df9502402604a51c469e02d7383ad89399c7b792d60586781c71ada044a2456975f8561aa42258bc5477aa439283e5360fb9238
-
SSDEEP
12288:O6Fbylg0LO2zqsnelpU4DySbSDC2CrzQ2px4hiMEouh:Okag5w74HbIC2mwgMEnh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1