General
-
Target
871768e4f3d4bc1e473bc694b4d5b39a52b1d3b9aa74a580083f3162ef425441
-
Size
833KB
-
Sample
241117-ss225asgla
-
MD5
c3176d8cec1327a8648d526ea708a89b
-
SHA1
93722d39cfdcaec37d5228b4fab67744e9ed4d5e
-
SHA256
871768e4f3d4bc1e473bc694b4d5b39a52b1d3b9aa74a580083f3162ef425441
-
SHA512
1f05078db38ed4553d6eda3f22664d6c1415713a7bac077c0974b449527e287cfcbe30ef360ddabcf24490c3d91ab209f18514fe2aad5fc5b3587363a3ef7820
-
SSDEEP
24576:IjovSJC2XoIPWI1RhEgBIDIfdwHT5LDdz5:3vSzoIxyIIDVHr
Static task
static1
Behavioral task
behavioral1
Sample
871768e4f3d4bc1e473bc694b4d5b39a52b1d3b9aa74a580083f3162ef425441.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz
Targets
-
-
Target
871768e4f3d4bc1e473bc694b4d5b39a52b1d3b9aa74a580083f3162ef425441
-
Size
833KB
-
MD5
c3176d8cec1327a8648d526ea708a89b
-
SHA1
93722d39cfdcaec37d5228b4fab67744e9ed4d5e
-
SHA256
871768e4f3d4bc1e473bc694b4d5b39a52b1d3b9aa74a580083f3162ef425441
-
SHA512
1f05078db38ed4553d6eda3f22664d6c1415713a7bac077c0974b449527e287cfcbe30ef360ddabcf24490c3d91ab209f18514fe2aad5fc5b3587363a3ef7820
-
SSDEEP
24576:IjovSJC2XoIPWI1RhEgBIDIfdwHT5LDdz5:3vSzoIxyIIDVHr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1