General
-
Target
Wire slip account payable.zip
-
Size
718KB
-
Sample
241121-phx4msskdy
-
MD5
3198e9e562a7dfa0125154c2aaa8c611
-
SHA1
6e250d85324b7cc0392c6e44ef9434fffd241845
-
SHA256
614c1412e2498b66ecb074f26059b8de8625738000bb908ebec78953b47ca5e8
-
SHA512
e12cdf076847385dbe79a0203c37e9e9c220b46b1d6ca8ef7c186e7bde8f531f91709afcc8226578169bca64b9505581715fbeb46b4e4e4afb96364ea5fb08bd
-
SSDEEP
12288:txJ3niPcAgnZp4K+X6BVKXShIvwF+Nyi1WmB9ZM4WWmtCkkcU9c1pszgBr:jJ8cASZqKlBkXShia+NZ1trJWWmHUip7
Static task
static1
Behavioral task
behavioral1
Sample
Wire slip account payable.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7180778750:AAGcpZL53RI1C6DEr2Yp4lM3UKxKArXTZ4I/
Targets
-
-
Target
Wire slip account payable.pif
-
Size
758KB
-
MD5
f3c67cd1bbb9c8a8bcb56ee97c5a7b27
-
SHA1
ad3397267ada55bca8d547dbb93bc79f40d138cf
-
SHA256
a36c66fb7fdfb2639cc0ccdeaeef4e6c1a1cd103ba76309ed32777b3f2ab069d
-
SHA512
6bd165450a9007ce4e90a120455bb9ff5914e423e99266cdc854b91aaea9376c3d54f78ab2ee034597ac90de74462f9e9e8b74b598e3d5c3b5edb834df0f757e
-
SSDEEP
12288:grOY+Ri3AgFdh1QW4s+HCBhKBSh4/wFgfyYVWmTr6bzoAlHJ35mkR:pQ3Ag/QzsjBgBShKagfJVtv63oArD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1