General
-
Target
567890760980.scr.exe
-
Size
770KB
-
Sample
240930-kl1xgszgmc
-
MD5
2dcd12a2792c0f2cb39ecd4c7e20ab4f
-
SHA1
d5fc868e09452d93f513620bf597daceed71f3ee
-
SHA256
49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65
-
SHA512
de7e706e6cdb87b018d6436abb2fd44f1a496de9c914fcbd8aa722bb04123c627aab905c125f8ee7a4d95fe029598b1d34f232b72dc26b3831cf98f0ccfba292
-
SSDEEP
12288:w1ZF8Kmih8yenE8TL9XnbHBPSrwLokrRWh1Y8CRLfvTWsuXPRZtdAiMuL3TeB:wylihWhX9nV60skr+vCRLfLUXdd6uY
Static task
static1
Behavioral task
behavioral1
Sample
567890760980.scr.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Extracted
Protocol: ftp- Host:
ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
567890760980.scr.exe
-
Size
770KB
-
MD5
2dcd12a2792c0f2cb39ecd4c7e20ab4f
-
SHA1
d5fc868e09452d93f513620bf597daceed71f3ee
-
SHA256
49a6d4dde10788e5000df6a0fad4be9ab17567fd1314b64c3d7be0257adcbc65
-
SHA512
de7e706e6cdb87b018d6436abb2fd44f1a496de9c914fcbd8aa722bb04123c627aab905c125f8ee7a4d95fe029598b1d34f232b72dc26b3831cf98f0ccfba292
-
SSDEEP
12288:w1ZF8Kmih8yenE8TL9XnbHBPSrwLokrRWh1Y8CRLfvTWsuXPRZtdAiMuL3TeB:wylihWhX9nV60skr+vCRLfLUXdd6uY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2