General
-
Target
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5
-
Size
914KB
-
Sample
241006-nh4ezswbne
-
MD5
e5493acc5eb33b66942332bde881e7c6
-
SHA1
8755f98c914fce6ba519504067f175779f2f96e4
-
SHA256
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5
-
SHA512
04cca7b4668f478300da6798b1d9ecef3e7183d1f90a4c982b0f9411971b2ab1f098d17c7828445ee992b0d1da14a2e77b1d6298d5c92e607c1fb8e8dcff6621
-
SSDEEP
24576:Jxb85Nc/jpuapFmf7wfMVbX/D76zax1q9:A5EpuHTy6Uai9
Static task
static1
Behavioral task
behavioral1
Sample
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.unitechautomations.com - Port:
587 - Username:
[email protected] - Password:
Unitech@123 - Email To:
[email protected]
Targets
-
-
Target
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5
-
Size
914KB
-
MD5
e5493acc5eb33b66942332bde881e7c6
-
SHA1
8755f98c914fce6ba519504067f175779f2f96e4
-
SHA256
948c35522178c3c40726d13d55ad649ccfb2c242cb8cfc4524786e2bd4b13ba5
-
SHA512
04cca7b4668f478300da6798b1d9ecef3e7183d1f90a4c982b0f9411971b2ab1f098d17c7828445ee992b0d1da14a2e77b1d6298d5c92e607c1fb8e8dcff6621
-
SSDEEP
24576:Jxb85Nc/jpuapFmf7wfMVbX/D76zax1q9:A5EpuHTy6Uai9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1