General
-
Target
84f0d8dc70167b92ecd20d985853064f6b0af8eaf3a39736256c3da225c06ec6
-
Size
655KB
-
Sample
241115-cpm6sszrck
-
MD5
98fa5a98dd08ff977e2b8569d0e5d06b
-
SHA1
cfb65dbeccee38aa1d0e52376dc5ec51686ee90a
-
SHA256
84f0d8dc70167b92ecd20d985853064f6b0af8eaf3a39736256c3da225c06ec6
-
SHA512
fcf388854023bbb74c6cee00dd2fbbd9942e3385c1376c9ae3e3bc4df73229b16ec3c9d7bd150143faaef09b773acaef95d4d4b969ff2a81c6f4da636556f9b2
-
SSDEEP
12288:jpQWbRAiDZeC16ADElhFwO75mnbpiuFAtRz3hGwHHEVzWZKuR6o:j5hDUKDEPFIguytRz3hGkkVfugo
Static task
static1
Behavioral task
behavioral1
Sample
image_25.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6852245174:AAHgk_9s-tH6YNacTaCnQz56uJMggI0fZDw/
Targets
-
-
Target
image_25.exe
-
Size
769KB
-
MD5
e46e492f9d98a484988f6f250c259fff
-
SHA1
276527beffd70654b3b3ebdf8f65721a9834efc5
-
SHA256
4ca5d1f4f3b52383886d6338b63b138961fc496a70a98c4e2e0a1bf1d6f646d6
-
SHA512
0ad7851651f57747e815e8e70dc04da14fe6d0d96f6cffcf69858e57e7ff90133dacc308751edc177945678fe1cacebb6ecca285b32d82a162f9e397df03168a
-
SSDEEP
12288:P4PyCJVMC1T7mTDesFxz1+ZHDhNOONb8i3HMl9sn0XMWR/whOxf87h:QPyCJVzpqDesZ+VDhNOOxV30tXRpwws
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1