General
-
Target
KVO2aqcU3IgpqHq.exe
-
Size
716KB
-
Sample
241015-hhlmaazgkh
-
MD5
3c15663abc554741be3de91a550ac0ae
-
SHA1
c815d1f6ec84ce3cc9ae098045032d01210f6584
-
SHA256
a898645f4029e742ca261f428c7985cb8c501586c48c35c06c4270c077833a9f
-
SHA512
87c093c07a976aba2a97c12d18c74925632abb0d8eb73442081e0f675437d180399a8e7e5da9533e3f4aafff858d4dc2d8872709c4bdbef16cb2da4fdc7d512c
-
SSDEEP
12288:0cir1S2IoOAc6/5rZGmy4OiGZno/ZX28j7xBDqtanEZgKHKL90S24sEmGq/sVXM3:diG9o13hUInE+KIsXJWXM2NtCmIe0
Static task
static1
Behavioral task
behavioral1
Sample
KVO2aqcU3IgpqHq.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
%qroUozO;(C2Rlyb
Targets
-
-
Target
KVO2aqcU3IgpqHq.exe
-
Size
716KB
-
MD5
3c15663abc554741be3de91a550ac0ae
-
SHA1
c815d1f6ec84ce3cc9ae098045032d01210f6584
-
SHA256
a898645f4029e742ca261f428c7985cb8c501586c48c35c06c4270c077833a9f
-
SHA512
87c093c07a976aba2a97c12d18c74925632abb0d8eb73442081e0f675437d180399a8e7e5da9533e3f4aafff858d4dc2d8872709c4bdbef16cb2da4fdc7d512c
-
SSDEEP
12288:0cir1S2IoOAc6/5rZGmy4OiGZno/ZX28j7xBDqtanEZgKHKL90S24sEmGq/sVXM3:diG9o13hUInE+KIsXJWXM2NtCmIe0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1