General
-
Target
ffc6b173f9b255702bdcbe65dd606f6154865c7fea2b2488305ba8f0d9ccef58.exe
-
Size
663KB
-
Sample
241119-shxpnasmal
-
MD5
e1dd3651d9a70515d3c9abf5d5f7ebea
-
SHA1
96ba119b6a2e9b38f5f8fddf2295a165c173ac91
-
SHA256
ffc6b173f9b255702bdcbe65dd606f6154865c7fea2b2488305ba8f0d9ccef58
-
SHA512
0294cfbb18e873e28870d63f457c77d164f8895a82d7dd94923896595090b61b4a88731e4dc8705e5101ac557a33aa000efd6dae5a95d65f48198026290c7128
-
SSDEEP
12288:k/ql/s0yLwhrglIcSCggngI15/IIdYSLzuhrHrKVuYlo37bbeHC68839KvKkR:DQw9zCgEzMIERG/ufbei68qw
Static task
static1
Behavioral task
behavioral1
Sample
ffc6b173f9b255702bdcbe65dd606f6154865c7fea2b2488305ba8f0d9ccef58.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991
Targets
-
-
Target
ffc6b173f9b255702bdcbe65dd606f6154865c7fea2b2488305ba8f0d9ccef58.exe
-
Size
663KB
-
MD5
e1dd3651d9a70515d3c9abf5d5f7ebea
-
SHA1
96ba119b6a2e9b38f5f8fddf2295a165c173ac91
-
SHA256
ffc6b173f9b255702bdcbe65dd606f6154865c7fea2b2488305ba8f0d9ccef58
-
SHA512
0294cfbb18e873e28870d63f457c77d164f8895a82d7dd94923896595090b61b4a88731e4dc8705e5101ac557a33aa000efd6dae5a95d65f48198026290c7128
-
SSDEEP
12288:k/ql/s0yLwhrglIcSCggngI15/IIdYSLzuhrHrKVuYlo37bbeHC68839KvKkR:DQw9zCgEzMIERG/ufbei68qw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1