General
-
Target
05686f0f36d10b7c3056592eba7b16959f1940268ca9979c2312c50b8a73e045.exe
-
Size
655KB
-
Sample
241120-cjmyvasqep
-
MD5
bfe4949eae3957221a1762bf563e5fbc
-
SHA1
56b362821de9f80cdcafcfb7f10a5728a55a1ee3
-
SHA256
05686f0f36d10b7c3056592eba7b16959f1940268ca9979c2312c50b8a73e045
-
SHA512
f8e9e8a1f62aac6383d302ec86675c3acd3a5e0dbbe2aae00a9545eb73d1c8d40806c9d0afac825a7aee3bc0b35a3ec0766e564565759670fc39abda99cde5b7
-
SSDEEP
12288:wV1o7m8OP6he57NiUokKZD0VQ2ErB3utA8hclbUoRp3D1vYd1E6:wHo7CPXpikKNKQjrB3S1hclYoRp3xvYf
Static task
static1
Behavioral task
behavioral1
Sample
05686f0f36d10b7c3056592eba7b16959f1940268ca9979c2312c50b8a73e045.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
CCu5Z?WuH+bS4hsz
Targets
-
-
Target
05686f0f36d10b7c3056592eba7b16959f1940268ca9979c2312c50b8a73e045.exe
-
Size
655KB
-
MD5
bfe4949eae3957221a1762bf563e5fbc
-
SHA1
56b362821de9f80cdcafcfb7f10a5728a55a1ee3
-
SHA256
05686f0f36d10b7c3056592eba7b16959f1940268ca9979c2312c50b8a73e045
-
SHA512
f8e9e8a1f62aac6383d302ec86675c3acd3a5e0dbbe2aae00a9545eb73d1c8d40806c9d0afac825a7aee3bc0b35a3ec0766e564565759670fc39abda99cde5b7
-
SSDEEP
12288:wV1o7m8OP6he57NiUokKZD0VQ2ErB3utA8hclbUoRp3D1vYd1E6:wHo7CPXpikKNKQjrB3S1hclYoRp3xvYf
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1