General
-
Target
261f7841575308d0cca028ddc25ddebd4ec1e8bab75e184133e129ce62d5f727
-
Size
695KB
-
Sample
241121-d8cd3sykhy
-
MD5
2c0dd8654aed855ffeb922c96d1f3fb1
-
SHA1
39bc6fcc9609e89f7bcf55d74d92d4f4f5891c68
-
SHA256
261f7841575308d0cca028ddc25ddebd4ec1e8bab75e184133e129ce62d5f727
-
SHA512
552d957bb8ac1f8567c1327d8154d2529c07a979e7d4880fe1e5921e32d9075e29d3d7ff7654711c68025d28ce6518e6c3dfb3c3654f8e36476bc887437e6962
-
SSDEEP
12288:GwkC9LVQTCZS5dQ+K8s3pJunIOEQZop0NRuvt+e/P3bsjkKlkWIgu8Luf:GwkC5VQTwS5nK8O2n8C6oRjoPQ4K2WnA
Static task
static1
Behavioral task
behavioral1
Sample
PO] G_24370-24396_SI2_S25_8658.exe
Resource
win7-20240729-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
PO] G_24370-24396_SI2_S25_8658.bat
-
Size
957KB
-
MD5
017162607e416c71df1a928cc1b1c050
-
SHA1
ce9608b1b166a1eca94bcaa8c55dc71f5bbc0778
-
SHA256
bcf46942b4fdd78b37ed54df727baa7c0b5e944257dce860f3fc8fd19313f520
-
SHA512
545da1840581bbd1e7aeef14288abc6df839f39a3250b7d3461b73382f55cea04f3f2f6df099b81a6517244b3db182b68c8c14e59970c5f83acb1066f14b3e0e
-
SSDEEP
24576:t9Orrbz6WzxWnTS/u8OWnMCi3NN2bSUKy:Kz6IWnTrrW/6NN2Ou
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1