General
-
Target
c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6
-
Size
2.2MB
-
Sample
241123-b7b1tavlc1
-
MD5
0c3fb6f18fef7082a5e471492a4ec464
-
SHA1
02e89c382c50a7745aa8fa8f489fe6a66f9d4d64
-
SHA256
c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6
-
SHA512
57d4dd97a88abe4fe9e1505a21e58bc693d9c1266447d8bca0d13d92b6576fe390b7fe1cd21dc09108fd7d30a0b3903bdfe1fef5ca876f047abeb7d58677a243
-
SSDEEP
49152:itYXs8Xh9t4uNRsezTQrm22obPhGcBV2aabQbziSFxc0sIIHpBXPe7+:itY88x9t4upQC2J8cBVjuOOpFL
Static task
static1
Behavioral task
behavioral1
Sample
c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Targets
-
-
Target
c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6
-
Size
2.2MB
-
MD5
0c3fb6f18fef7082a5e471492a4ec464
-
SHA1
02e89c382c50a7745aa8fa8f489fe6a66f9d4d64
-
SHA256
c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6
-
SHA512
57d4dd97a88abe4fe9e1505a21e58bc693d9c1266447d8bca0d13d92b6576fe390b7fe1cd21dc09108fd7d30a0b3903bdfe1fef5ca876f047abeb7d58677a243
-
SSDEEP
49152:itYXs8Xh9t4uNRsezTQrm22obPhGcBV2aabQbziSFxc0sIIHpBXPe7+:itY88x9t4upQC2J8cBVjuOOpFL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1