General
-
Target
ec92d715ee5919aac9953358f7d96ff278bc886e40985e496a5057e0021b9cb1
-
Size
600KB
-
Sample
240924-yr6a2ssenk
-
MD5
c9eb31b92bd5f12cdca5b3b0adf1b4ad
-
SHA1
27d00a637f35daea9ecc2b560d4830608c5155a4
-
SHA256
ec92d715ee5919aac9953358f7d96ff278bc886e40985e496a5057e0021b9cb1
-
SHA512
bc4ddbc33a5b4a3b23960828f5c44ce5c745538b100726eebfeddf806bac94687f9f3acc03837afeef6597f2f1aa4f03beb0351fc72c666ea7af71c19bf81527
-
SSDEEP
12288:HfSG5EsnsL48hKCh7VMiZD0vTdmeKlR6CWsFlJ+1w+LAv:/b5nsL5rM4D0Ldjk/J+1w+s
Static task
static1
Behavioral task
behavioral1
Sample
2hhirnfCjjGLDeS.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb
Targets
-
-
Target
2hhirnfCjjGLDeS.exe
-
Size
648KB
-
MD5
f8cf1a175b28df39dd71bf8904d55786
-
SHA1
bdfb0854aad8206d67884c60ac00d7f357c76e31
-
SHA256
fffe5a14638b46fd06a74d0004b98d96a72a411ae2551c8d1665991107542b69
-
SHA512
79a16cd0947892278be14ede6425b5087a187e566756de4e858b82cf82b7ea3b844faabd672dce570e74874613afdfe5192a07ec96a2d287f60d1a72d29f2a8e
-
SSDEEP
12288:J/SG3yw9EAARdYiQxnnvTTmeohR6+WsvanFf9MNq128bQb:J/biW9ARdynLT3Qynbt1FI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1