General
-
Target
efad3269d3bd9b9dfea3c1553dde89ad411d4dc850ad2cc9268e291ed3af1c6c
-
Size
588KB
-
Sample
241116-1tmylatpa1
-
MD5
fa3309618a27e783bae75851a87a5d2b
-
SHA1
626fcaadcb201254c2b72d296ae0faf9b67874c8
-
SHA256
efad3269d3bd9b9dfea3c1553dde89ad411d4dc850ad2cc9268e291ed3af1c6c
-
SHA512
52f7aeeb80e17e3c04579cccd9ac3c1a27686ff60ebf944aa701c498c5d64640091aea9e34d26d037755359600ae5c766735edf461095167a66c78e23054b2b9
-
SSDEEP
12288:nMyCIRIyYSD1MYosZPbTV4PZqsdrrz4GeGTiBQL3Ao:nMyfKyYC1MYtZPbmqwz4pI
Static task
static1
Behavioral task
behavioral1
Sample
efad3269d3bd9b9dfea3c1553dde89ad411d4dc850ad2cc9268e291ed3af1c6c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
efad3269d3bd9b9dfea3c1553dde89ad411d4dc850ad2cc9268e291ed3af1c6c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
efad3269d3bd9b9dfea3c1553dde89ad411d4dc850ad2cc9268e291ed3af1c6c
-
Size
588KB
-
MD5
fa3309618a27e783bae75851a87a5d2b
-
SHA1
626fcaadcb201254c2b72d296ae0faf9b67874c8
-
SHA256
efad3269d3bd9b9dfea3c1553dde89ad411d4dc850ad2cc9268e291ed3af1c6c
-
SHA512
52f7aeeb80e17e3c04579cccd9ac3c1a27686ff60ebf944aa701c498c5d64640091aea9e34d26d037755359600ae5c766735edf461095167a66c78e23054b2b9
-
SSDEEP
12288:nMyCIRIyYSD1MYosZPbTV4PZqsdrrz4GeGTiBQL3Ao:nMyfKyYC1MYtZPbmqwz4pI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1