General
-
Target
dfbeba838a8f0ab768d8ee8c1f06294e3d69670d187b3244614669f95c86b12a
-
Size
619KB
-
Sample
241003-j1jq3stalp
-
MD5
e54d15648bb7f2421543dc51d5360b2a
-
SHA1
d6846c36a5760f4e4adebb14dbd970e30daa0502
-
SHA256
dfbeba838a8f0ab768d8ee8c1f06294e3d69670d187b3244614669f95c86b12a
-
SHA512
411ea7f09c8086117abaa28000ae15d1a52070d7ac3ee76604860ee2db5695873cf74ec6ec571ed9adb11f953ad5e0a60c33d3dffb7710381348c3cd42c5972d
-
SSDEEP
12288:93lFzMDX6+ULPd4JZW4u9R573Qewc7j3fQFXfnT7kcPZp9+3KzN74ASxZQY7bxq:BXIDXRG4Gb5LL7jyTRg4NcAE/q
Static task
static1
Behavioral task
behavioral1
Sample
GH987667890000.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Extracted
Protocol: ftp- Host:
ftp.antoniomayol.com - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
GH987667890000.cmd
-
Size
788KB
-
MD5
13056701d66cd5f352657bc21e9a4b2e
-
SHA1
cc16cbd465b2cf203644de3c76934f6a030e3f74
-
SHA256
9e30a7dadfe8f7f35f91d06fb067875d0eb96c2ffe210636505f4ed9b49b8593
-
SHA512
d56fd29326cb69716c6b5284335ebf574cc9ce58678c0aa0627926e605e5916df1466435c1dd5a11974d5b8a09e4968b337ea57e2b862ade2846b8de79315694
-
SSDEEP
12288:ujSXMDXK+HgGy4JAru9X57VQ6CcPB3fQ/XfVP7kkPNpz94RuCxB6A7N5R:PcDXBAl4e6V5BzPBWP9X9LG6A7Nb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1