General
-
Target
38d921d063a0fb892086121bb34180b2a930819788a3e34a0d2f65224142d930.exe
-
Size
666KB
-
Sample
241119-ew52asznct
-
MD5
8f942f19242779ce2a16373221d5590a
-
SHA1
ef9a11fd0d62a51b4f561fe6b2f88505655ca90b
-
SHA256
38d921d063a0fb892086121bb34180b2a930819788a3e34a0d2f65224142d930
-
SHA512
50216249d3f120ea64e377bb3acd27edf4bef502d5cb4b83c3ab6974160dec4d7361cc5579f4e828403a2c3ed1cfcd926f64cab426758be84925a50b6e827947
-
SSDEEP
12288:FA6/s0yDmWpn5La3GDbFT0W84mJKIfr/vJmsqXzfnXqO36wxYKBb2jXkR:pNSLIGF0WADI3znXqRwqKBaC
Static task
static1
Behavioral task
behavioral1
Sample
38d921d063a0fb892086121bb34180b2a930819788a3e34a0d2f65224142d930.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7180778750:AAGcpZL53RI1C6DEr2Yp4lM3UKxKArXTZ4I/
Targets
-
-
Target
38d921d063a0fb892086121bb34180b2a930819788a3e34a0d2f65224142d930.exe
-
Size
666KB
-
MD5
8f942f19242779ce2a16373221d5590a
-
SHA1
ef9a11fd0d62a51b4f561fe6b2f88505655ca90b
-
SHA256
38d921d063a0fb892086121bb34180b2a930819788a3e34a0d2f65224142d930
-
SHA512
50216249d3f120ea64e377bb3acd27edf4bef502d5cb4b83c3ab6974160dec4d7361cc5579f4e828403a2c3ed1cfcd926f64cab426758be84925a50b6e827947
-
SSDEEP
12288:FA6/s0yDmWpn5La3GDbFT0W84mJKIfr/vJmsqXzfnXqO36wxYKBb2jXkR:pNSLIGF0WADI3znXqRwqKBaC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1