General
-
Target
tmp5inh3zk1
-
Size
733KB
-
Sample
241002-tq323svhqp
-
MD5
c80a6ab88197ae041f37e89de88c432c
-
SHA1
2ff5a4f5d4c598e910a331e04dcc17a6a8c0cd82
-
SHA256
b653369d65923416167ddd72e78411fed77a2b7be24bf6c1eba06512a232594a
-
SHA512
7892a721f51a7d686129638ee47c4f7f15cdaaa221004cb4a52fde29111c44aac03b3a7dcc3044ae624f07870cedc00cc0e884e1801432d6bb9e6511acc0cdb9
-
SSDEEP
12288:+L7WTG4meL6865A0phF2/lDHwu+yIlohn+9T5FfbsCsaYbRu:MSTVh6RNQIlo03NsCTIR
Static task
static1
Behavioral task
behavioral1
Sample
tmp5inh3zk1.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bonnyriggdentalsurgery.com.au - Port:
587 - Username:
[email protected] - Password:
eL)rV@QBKA#m - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.bonnyriggdentalsurgery.com.au - Port:
587 - Username:
[email protected] - Password:
eL)rV@QBKA#m
Targets
-
-
Target
tmp5inh3zk1
-
Size
733KB
-
MD5
c80a6ab88197ae041f37e89de88c432c
-
SHA1
2ff5a4f5d4c598e910a331e04dcc17a6a8c0cd82
-
SHA256
b653369d65923416167ddd72e78411fed77a2b7be24bf6c1eba06512a232594a
-
SHA512
7892a721f51a7d686129638ee47c4f7f15cdaaa221004cb4a52fde29111c44aac03b3a7dcc3044ae624f07870cedc00cc0e884e1801432d6bb9e6511acc0cdb9
-
SSDEEP
12288:+L7WTG4meL6865A0phF2/lDHwu+yIlohn+9T5FfbsCsaYbRu:MSTVh6RNQIlo03NsCTIR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1