General
-
Target
fd38d71f20692a784cc633702e3a09a5a419bb113f72b93c8e8bd1141adff814
-
Size
644KB
-
Sample
241119-bm4kbsyhmn
-
MD5
233cbd14d5ddc154af32051ed8c4cf30
-
SHA1
5433a9aca012f007b94fba9ea88a40b6c74fc284
-
SHA256
fd38d71f20692a784cc633702e3a09a5a419bb113f72b93c8e8bd1141adff814
-
SHA512
b8a4a77fb8c8c36a375c27e74d37e91f8aba13bd96215876a0e438aefd3a8312d8d3ef3a27b340d31ef13daf66ebebeff53c3a023a7bfa7b1a8847f1b3d4dbf6
-
SSDEEP
12288:NUY/s0yMnHFwms+82k1eHIecCTb9ODqhT4IT3hTy+9vsHvVz:j1nlwmL82k1eHqi6A0ITlyqG
Static task
static1
Behavioral task
behavioral1
Sample
fd38d71f20692a784cc633702e3a09a5a419bb113f72b93c8e8bd1141adff814.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.normagroup.com.tr - Port:
21 - Username:
[email protected] - Password:
Qb.X[.j.Yfm[
Targets
-
-
Target
fd38d71f20692a784cc633702e3a09a5a419bb113f72b93c8e8bd1141adff814
-
Size
644KB
-
MD5
233cbd14d5ddc154af32051ed8c4cf30
-
SHA1
5433a9aca012f007b94fba9ea88a40b6c74fc284
-
SHA256
fd38d71f20692a784cc633702e3a09a5a419bb113f72b93c8e8bd1141adff814
-
SHA512
b8a4a77fb8c8c36a375c27e74d37e91f8aba13bd96215876a0e438aefd3a8312d8d3ef3a27b340d31ef13daf66ebebeff53c3a023a7bfa7b1a8847f1b3d4dbf6
-
SSDEEP
12288:NUY/s0yMnHFwms+82k1eHIecCTb9ODqhT4IT3hTy+9vsHvVz:j1nlwmL82k1eHqi6A0ITlyqG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1