General
-
Target
30092024_1158_29092024_PO-098765678000.Doc.z
-
Size
669KB
-
Sample
240930-n49twsybja
-
MD5
cd139f64b5dc030a58086466cdb6023d
-
SHA1
462f2d293789b32b925c43866c1cddb2c00b5a38
-
SHA256
b812a55ff904cbb2d44d5e857e1f55fc6523c702614a95a5a5c597049a120749
-
SHA512
9437ac5cbdc98ec2aa4ca76c96ac33ffd31eb816b6134afc6824dab17642bb1e4e85ff4d9a4406d8386e17b07fb12481fb02dc9b8f7bfca929b6dbe7941f7e14
-
SSDEEP
12288:Vga3qZAUwmwnffA+Qm8AOXSTDA/TS+H10x3X07F5HQcRccVi4iQKonJDZ:qa3Zu+Q3jqo30x3X07L324vnJDZ
Static task
static1
Behavioral task
behavioral1
Sample
PO-098765678000.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Extracted
Protocol: ftp- Host:
ftp.antoniomayol.com - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
PO-098765678000.bat
-
Size
764KB
-
MD5
f9617b77cfa61832aa0db5c8cd8e0357
-
SHA1
95ca6b88193fad7de1a9693639641f42744136c4
-
SHA256
e2e31ef953c1dee99b1b6ee23c149b568a76d44531457adb0c89eff648c58a55
-
SHA512
9958f54f5a1fde6e7f6315395080579277958f2e3416e39908576c8fa0b55c162d1d845da203511070d58a2724f88b343ce475b8c63cf544f7f53712f5c50d92
-
SSDEEP
12288:qUx5U3TB2nJfk+Cs8uOtcTDA/dS+H1cxhNw7HBKQ0oL85yhl04:qUx8b+CxTwoZcxhNw7HHhz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1