General
-
Target
50a42bf60a37c5ffc7039e53d644d7c2a61506ba5f9628f21a55a10a9ea98e1f.exe
-
Size
698KB
-
Sample
241009-bzcblstcpb
-
MD5
f353045626c8a74548823aa66e667a38
-
SHA1
bec1cf4e79f56dc15d2be6938550c58e018c4a51
-
SHA256
50a42bf60a37c5ffc7039e53d644d7c2a61506ba5f9628f21a55a10a9ea98e1f
-
SHA512
9d0fa7b9c3395cf85a4a32f9aa53165ede4dfe285c566fe7452db7069c51b2a3863c8b533c035c43b9b1ce9d7e6c2f89ae52b7d86fbf5aa1ca4acf315ccc56c5
-
SSDEEP
12288:vnCObAX9ku5iJeAZWm5t/wVu00E9TUQShAF5vSj6UQjNGe3ICMo0mE:TI93A0m5t/suDE91EC5v/UQYdhUE
Static task
static1
Behavioral task
behavioral1
Sample
50a42bf60a37c5ffc7039e53d644d7c2a61506ba5f9628f21a55a10a9ea98e1f.exe
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.alhoneycomb.com - Port:
587 - Username:
[email protected] - Password:
WORTHwill3611!
Extracted
agenttesla
Protocol: smtp- Host:
mail.alhoneycomb.com - Port:
587 - Username:
[email protected] - Password:
WORTHwill3611! - Email To:
[email protected]
Targets
-
-
Target
50a42bf60a37c5ffc7039e53d644d7c2a61506ba5f9628f21a55a10a9ea98e1f.exe
-
Size
698KB
-
MD5
f353045626c8a74548823aa66e667a38
-
SHA1
bec1cf4e79f56dc15d2be6938550c58e018c4a51
-
SHA256
50a42bf60a37c5ffc7039e53d644d7c2a61506ba5f9628f21a55a10a9ea98e1f
-
SHA512
9d0fa7b9c3395cf85a4a32f9aa53165ede4dfe285c566fe7452db7069c51b2a3863c8b533c035c43b9b1ce9d7e6c2f89ae52b7d86fbf5aa1ca4acf315ccc56c5
-
SSDEEP
12288:vnCObAX9ku5iJeAZWm5t/wVu00E9TUQShAF5vSj6UQjNGe3ICMo0mE:TI93A0m5t/suDE91EC5v/UQYdhUE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1