General
-
Target
29739350ffba4e0dc877ce4e6ef22549aa859a7dbd046c3282bcb5dbd621f3ab
-
Size
654KB
-
Sample
241119-zj4mxssckb
-
MD5
379476282faf15cacdc5fa4d657cc6e0
-
SHA1
7ff1722cc20c6eb8ad0e5d8cbce36ef2767eab21
-
SHA256
29739350ffba4e0dc877ce4e6ef22549aa859a7dbd046c3282bcb5dbd621f3ab
-
SHA512
7b6131cf86c7914d299d2e91fc064158a71b1d3ff26504d685ba6bfd67eb80d9e32513c12306f471bef6795c8946c26bfc55aa3a1875de33d52c63067c9ef466
-
SSDEEP
12288:R3HI6PVxWARv62mJ2n9EYYDT4LuSiI7kplagS5q0LXrw:hHI4VQcCLJ29Ek97ilTS5ZLb
Static task
static1
Behavioral task
behavioral1
Sample
29739350ffba4e0dc877ce4e6ef22549aa859a7dbd046c3282bcb5dbd621f3ab.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.normagroup.com.tr - Port:
21 - Username:
[email protected] - Password:
Qb.X[.j.Yfm[
Targets
-
-
Target
29739350ffba4e0dc877ce4e6ef22549aa859a7dbd046c3282bcb5dbd621f3ab
-
Size
654KB
-
MD5
379476282faf15cacdc5fa4d657cc6e0
-
SHA1
7ff1722cc20c6eb8ad0e5d8cbce36ef2767eab21
-
SHA256
29739350ffba4e0dc877ce4e6ef22549aa859a7dbd046c3282bcb5dbd621f3ab
-
SHA512
7b6131cf86c7914d299d2e91fc064158a71b1d3ff26504d685ba6bfd67eb80d9e32513c12306f471bef6795c8946c26bfc55aa3a1875de33d52c63067c9ef466
-
SSDEEP
12288:R3HI6PVxWARv62mJ2n9EYYDT4LuSiI7kplagS5q0LXrw:hHI4VQcCLJ29Ek97ilTS5ZLb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1