General
-
Target
1bfe0097e024c7455bc0973ca320da229351ab046634e9326d5a0ab6c4cbc14b
-
Size
596KB
-
Sample
241117-bgzzyssjal
-
MD5
ab740185b31f30f22edb07dc7d6867f6
-
SHA1
5fd98ecf544b898f5e8609c7ed13847ee729eb66
-
SHA256
1bfe0097e024c7455bc0973ca320da229351ab046634e9326d5a0ab6c4cbc14b
-
SHA512
54f2e0cfa149a1159d6ab2c23947b589a081b84acee90115e005e7748c5e6456a403ab76f2f0f9dd4b9eb515f9221b44c61cf7c9a87297022699a51ba7107d15
-
SSDEEP
12288:shix+bcrQH9mnis2V09jgS4iTE61wpwiTerLHQfSJX:R6jmniejgEg61wp/TeXg8
Static task
static1
Behavioral task
behavioral1
Sample
image.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6852245174:AAHgk_9s-tH6YNacTaCnQz56uJMggI0fZDw/
Targets
-
-
Target
image.exe
-
Size
1.8MB
-
MD5
73c13ccef8a21994322a9d6088753294
-
SHA1
7b3d167c9d3af83abe772040fe87507e08a56665
-
SHA256
aa4b277c8b219071a9d1196920c5929ed3c7b368b14e2daf241e1001216c25b3
-
SHA512
c8943fcfe0fa4da8c9b9e8cff0dbe032b806fa520eeceb4f05c56a95afe93b60ea4ae375d53ffb53194ee52c774961cad0209608a5aeb120439361ab534c2ac5
-
SSDEEP
12288:Ehsv71fj25HTvgxSoog9so0aFj+HIbJCRTGvDsFbsQ4cp:E2p6pkSoeo0a44CRG7Ioi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1