General
-
Target
86548927a6a677ef5b188069d885fd755d56dcd21ba7b01c96915ec888c86846.zip
-
Size
634KB
-
Sample
241005-qsm7vstfqk
-
MD5
d2a5b7b4ee9503155d19c00548059e31
-
SHA1
107951d1a88d56041dfbb272bbc4c49a3921e075
-
SHA256
38ef20b71846a8278f246ff6ce1a847a2d52ddc9b0c1f5494ba4517101281490
-
SHA512
73ffe4073e8465c3a10699ce93217b813f992419af6b726ba9aee9ee952b8c8d16d8d5c32ad5448254e3af9d9d211d6e4c893444d4238f4634c3acbb46c2a01b
-
SSDEEP
12288:wcrvLZT7/fTm9mEEkD6Y+o5g4ahyDpXnO3r0Tk5k:woD17z5kDDPaYDdV
Static task
static1
Behavioral task
behavioral1
Sample
86548927a6a677ef5b188069d885fd755d56dcd21ba7b01c96915ec888c86846.zip
Resource
win10-20240404-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@123
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Anambraeast@123 - Email To:
[email protected]
Targets
-
-
Target
86548927a6a677ef5b188069d885fd755d56dcd21ba7b01c96915ec888c86846.zip
-
Size
634KB
-
MD5
d2a5b7b4ee9503155d19c00548059e31
-
SHA1
107951d1a88d56041dfbb272bbc4c49a3921e075
-
SHA256
38ef20b71846a8278f246ff6ce1a847a2d52ddc9b0c1f5494ba4517101281490
-
SHA512
73ffe4073e8465c3a10699ce93217b813f992419af6b726ba9aee9ee952b8c8d16d8d5c32ad5448254e3af9d9d211d6e4c893444d4238f4634c3acbb46c2a01b
-
SSDEEP
12288:wcrvLZT7/fTm9mEEkD6Y+o5g4ahyDpXnO3r0Tk5k:woD17z5kDDPaYDdV
Score1/10 -
-
-
Target
86548927a6a677ef5b188069d885fd755d56dcd21ba7b01c96915ec888c86846.exe
-
Size
666KB
-
MD5
49a614236d15faef7cf8bf28ab590829
-
SHA1
0009643dea2b241e31200fa7d0e87f2195974fdc
-
SHA256
86548927a6a677ef5b188069d885fd755d56dcd21ba7b01c96915ec888c86846
-
SHA512
8635bf3a1a6b552bc49d7e2369d914345ffb82e37090bd1902a4de3ec0638ee2c2f4c1715fcdaf2c410bb7fdf78ce00bd74ce3bf9ce803e206295982459a653e
-
SSDEEP
12288:FMy2+qkC8slD1k92DVgbLEc5zZVxmmq8F46MYsXQ5l2bkR:Fj/Hsl5k92sPFZVEDYzK+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1