General
-
Target
ee519b70614569e0942c403612eb7a4252b0c31036fa46815cdc0e7260609247
-
Size
659KB
-
Sample
241117-bkr4hssjem
-
MD5
b8a10d9d70f2439ee0b8ab06404b78bd
-
SHA1
2370c6bb37ad13a7c0a3ecc1296356790c287882
-
SHA256
ee519b70614569e0942c403612eb7a4252b0c31036fa46815cdc0e7260609247
-
SHA512
95a9da13acb827c522151a3c978138c15d192368d39617ab3b78a0dfc527a0f86cfe41a3a584bdbdac60dd2fe6e67c58839aecb775e4a142920d44400cdfde6c
-
SSDEEP
12288:PMyCCiqNOtlnnd+U2okMtiJd210bckIHAZrk9OIFjK2dgBvHz3jc:PMyHmd0Qtqd2azCWMDDdgBvT3jc
Static task
static1
Behavioral task
behavioral1
Sample
ee519b70614569e0942c403612eb7a4252b0c31036fa46815cdc0e7260609247.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz
Targets
-
-
Target
ee519b70614569e0942c403612eb7a4252b0c31036fa46815cdc0e7260609247
-
Size
659KB
-
MD5
b8a10d9d70f2439ee0b8ab06404b78bd
-
SHA1
2370c6bb37ad13a7c0a3ecc1296356790c287882
-
SHA256
ee519b70614569e0942c403612eb7a4252b0c31036fa46815cdc0e7260609247
-
SHA512
95a9da13acb827c522151a3c978138c15d192368d39617ab3b78a0dfc527a0f86cfe41a3a584bdbdac60dd2fe6e67c58839aecb775e4a142920d44400cdfde6c
-
SSDEEP
12288:PMyCCiqNOtlnnd+U2okMtiJd210bckIHAZrk9OIFjK2dgBvHz3jc:PMyHmd0Qtqd2azCWMDDdgBvT3jc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1