General
-
Target
9565e0e3358341d167b1adfe5a30b957aa028e19addb4427af1bbd41bfe67e6b.exe
-
Size
780KB
-
Sample
241120-dppv3ayhlf
-
MD5
8fb83908d231f26f462b5c591a11048d
-
SHA1
9d12d01f183927f09ed6b654ddad8bdafb48e3a8
-
SHA256
9565e0e3358341d167b1adfe5a30b957aa028e19addb4427af1bbd41bfe67e6b
-
SHA512
b23eaa389f3996b3a7cc030fb797b2edc3978070a0fbb2dfca305e8ba22eac682c8545558bc6d84b16a2827a129f6e0a57bd17f0c26369268a16949bc39fe1ac
-
SSDEEP
12288:gGgrKo7e7uh5DdXoaWS1pBGGdkM8ipU1m7nMrsIIk6/yA95i+V:gGfo7Ko5DdYaWS1Kf9ipUomF9
Static task
static1
Behavioral task
behavioral1
Sample
9565e0e3358341d167b1adfe5a30b957aa028e19addb4427af1bbd41bfe67e6b.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs
Targets
-
-
Target
9565e0e3358341d167b1adfe5a30b957aa028e19addb4427af1bbd41bfe67e6b.exe
-
Size
780KB
-
MD5
8fb83908d231f26f462b5c591a11048d
-
SHA1
9d12d01f183927f09ed6b654ddad8bdafb48e3a8
-
SHA256
9565e0e3358341d167b1adfe5a30b957aa028e19addb4427af1bbd41bfe67e6b
-
SHA512
b23eaa389f3996b3a7cc030fb797b2edc3978070a0fbb2dfca305e8ba22eac682c8545558bc6d84b16a2827a129f6e0a57bd17f0c26369268a16949bc39fe1ac
-
SSDEEP
12288:gGgrKo7e7uh5DdXoaWS1pBGGdkM8ipU1m7nMrsIIk6/yA95i+V:gGfo7Ko5DdYaWS1Kf9ipUomF9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1