General
-
Target
21dc7ae344a0f3080e4ad377e1f70d0e61c77c189ff7b3f6f8de77ef01276dc9
-
Size
1.2MB
-
Sample
240925-wjky2asbmg
-
MD5
0ed5a69b30006e75aede9ff6837b32bb
-
SHA1
06c09327b14fca12fe02720775c26b93d6d5be26
-
SHA256
21dc7ae344a0f3080e4ad377e1f70d0e61c77c189ff7b3f6f8de77ef01276dc9
-
SHA512
f2447b2959e84f9428b444189066c9905e2871396bbd0bcb12edf7dabb7a666162f6deab95ec04da02e73aa488f5d74ae9b3e2168fbec04a850189992197d796
-
SSDEEP
24576:00EKYWcxVY5VdiRucmkfMR2P1s6G+4kFCJpX8Sc4hWsjPsKReCBO912LVbBre:00kHAjiYPP0Ot+BFMzVhWIPfSqLVb0
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
Purchase order.exe
-
Size
1.5MB
-
MD5
fb3ad7e9cb5938ad1af8facf52693b27
-
SHA1
4a45c5429a503e8730ebc5261441e91b963510d1
-
SHA256
d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793
-
SHA512
bf4dd0c6a664e3e4b3fd584a5bc11d55fd874eabceee066f78ea5eb6ce0ab25fb08732cb1eb8baa96beae173474ff4f761b453a8e8544171e16703b1acbf1b60
-
SSDEEP
24576:8IFcjHUVcxTE59dcvuc8kXeRYPps4GY4a9qJVX8ScEhAs3PseK0dHosEfzbm:8IFczdarcW/hySXYh9UPvhAKPFFOsw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1