General
-
Target
vvndewpluori91026.exe
-
Size
653KB
-
Sample
240925-qx416s1fnd
-
MD5
432644163e0aaa8a0269179e0e036eae
-
SHA1
b504d2a91b22bb45b886c1d117dacdfa724fe262
-
SHA256
f3c9e7b2e91b53c3256429497a9fb5d2cd449aca5d5a3b9fb705fe7d8c55d699
-
SHA512
f076b13cf11a2af5a5d008e62286ab1def0bdbf01e5f1388341575ac78552cb8ae140ba9f73041d239a0e2aa2a36db525b681d9bf138b3a6c815c8f41941e80c
-
SSDEEP
12288:HeoLvyENxun9zJ7qeNgA3KPIPryfZTHfY87PCl8YK3TkQPzLxnjwX8bQb:9dvun9zJ7VNR3KPMrGRNR1hcYI
Static task
static1
Behavioral task
behavioral1
Sample
vvndewpluori91026.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
aowapnzgtwgqowgt - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
aowapnzgtwgqowgt
Targets
-
-
Target
vvndewpluori91026.exe
-
Size
653KB
-
MD5
432644163e0aaa8a0269179e0e036eae
-
SHA1
b504d2a91b22bb45b886c1d117dacdfa724fe262
-
SHA256
f3c9e7b2e91b53c3256429497a9fb5d2cd449aca5d5a3b9fb705fe7d8c55d699
-
SHA512
f076b13cf11a2af5a5d008e62286ab1def0bdbf01e5f1388341575ac78552cb8ae140ba9f73041d239a0e2aa2a36db525b681d9bf138b3a6c815c8f41941e80c
-
SSDEEP
12288:HeoLvyENxun9zJ7qeNgA3KPIPryfZTHfY87PCl8YK3TkQPzLxnjwX8bQb:9dvun9zJ7VNR3KPMrGRNR1hcYI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1