General
-
Target
7708fb3f966914364070c02f452d8cd483d5ea6856308b9bc749c8cabfbb593d
-
Size
755KB
-
Sample
241120-bqkavsxkhy
-
MD5
cb0ac1191553b7999eb693221ae85ca6
-
SHA1
eb1ba8fb7d5745ece9196286209862c4a7808b84
-
SHA256
7708fb3f966914364070c02f452d8cd483d5ea6856308b9bc749c8cabfbb593d
-
SHA512
35e3fd137495092f884ff9555355dcf7d3d5852fa68ecc56c2efedecab18ce6ad3c25ae94d655c5a49ffe8d91efb9e98af5e12da3e1dd8e16c39e774b1bf65e6
-
SSDEEP
12288:ol2B0xTGlxNqvNu2hZ+nUEsn9ZQyB9upgvWrsGPAdOSmWnCP87iL3KvO15me:olLaVUH999ZPaWlO/5d1E
Static task
static1
Behavioral task
behavioral1
Sample
7708fb3f966914364070c02f452d8cd483d5ea6856308b9bc749c8cabfbb593d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7708fb3f966914364070c02f452d8cd483d5ea6856308b9bc749c8cabfbb593d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1109192612914667662/L7DPrTTgwLVo-HTHP4J69rxCT2drNUJpTdtay8IRlxPLwEltYViOFvejBNgw8-Eje4HA
Targets
-
-
Target
7708fb3f966914364070c02f452d8cd483d5ea6856308b9bc749c8cabfbb593d
-
Size
755KB
-
MD5
cb0ac1191553b7999eb693221ae85ca6
-
SHA1
eb1ba8fb7d5745ece9196286209862c4a7808b84
-
SHA256
7708fb3f966914364070c02f452d8cd483d5ea6856308b9bc749c8cabfbb593d
-
SHA512
35e3fd137495092f884ff9555355dcf7d3d5852fa68ecc56c2efedecab18ce6ad3c25ae94d655c5a49ffe8d91efb9e98af5e12da3e1dd8e16c39e774b1bf65e6
-
SSDEEP
12288:ol2B0xTGlxNqvNu2hZ+nUEsn9ZQyB9upgvWrsGPAdOSmWnCP87iL3KvO15me:olLaVUH999ZPaWlO/5d1E
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1