General
-
Target
7af64c29b708e76de85aadbc426399279dfa806489de937d4de973a81c610891.tar
-
Size
922KB
-
Sample
241002-brg7wszepr
-
MD5
4ed3110f6169b07a5179d14c175275a8
-
SHA1
aa4575cdf49ffee82b55f829e484755749958568
-
SHA256
7af64c29b708e76de85aadbc426399279dfa806489de937d4de973a81c610891
-
SHA512
ac843513629860e813ea5318c61a9d169ffc5accab5a6a5d16ae668def1b5410e44a4fb21d0994112f5f93bd4d4f87d331e45e31fd82ffdf53e29cd4e9fd49ba
-
SSDEEP
12288:g3TEG/N9AKPGu+MAyn6+6Slh5/2qVe2lR8XaZW4IaBAP7r9r/+ppppppppppppp7:NAnAPRo6+pPOnoR8X2W4JBA1q
Static task
static1
Behavioral task
behavioral1
Sample
FYCC new order S460013746-560121121.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
FYCC new order S460013746-560121121.exe
-
Size
920KB
-
MD5
78eff09f295aa4b3aaf36af5245efe94
-
SHA1
dea545e8b85f2c1201f7aa3a54f643826ca8a6ed
-
SHA256
38f275624c634801c164c2c8f3294cbeea49b47e8e8d83bda53a0bc8aa7f7106
-
SHA512
a8b49247156aa7004206f24211054f7f37c73df06e8a85ecf843e9c44cc99a5cf29886e85ba03d89a87a1d3968322c25cdef7877ae6c5efcfa946910204ce67f
-
SSDEEP
12288:T3TEG/N9AKPGu+MAyn6+6Slh5/2qVe2lR8XaZW4IaBAP7r9r/+ppppppppppppp7:8AnAPRo6+pPOnoR8X2W4JBA1q
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1