General
-
Target
f2328dd8020d35e6e05fbf24367c4c445b5ebd701b2a570ab3349d8013461f31
-
Size
581KB
-
Sample
241123-ffepvavmhn
-
MD5
ab0bc139ac67b67ad7613e00ec64c105
-
SHA1
77de9a7e98aa432b0b296bbcb16b0ffa61e39618
-
SHA256
f2328dd8020d35e6e05fbf24367c4c445b5ebd701b2a570ab3349d8013461f31
-
SHA512
146a6327557b6057beddf36f2ae33c223442f85380dff11b9269c14728e53276ba1aa10b21da688d52d564ec40b31d00c1ddddbad621ecf0558dee427aea2356
-
SSDEEP
12288:DVtBtQMha6fvYwwPEr52DRsnEOFIPAyuV57qUqPgM72gyTM/c8Z8JwWc54U:z/xU6YLmLuPg7fqPgMy2/c8Z8tHU
Static task
static1
Behavioral task
behavioral1
Sample
PO] G_24370-24396_SI2_S25_8658.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
PO] G_24370-24396_SI2_S25_8658.exe
-
Size
2.3MB
-
MD5
fd1db3d42f8ce22b75ee45b2b2e18075
-
SHA1
532f70a54fb672faca5fd8fbf3df4b9e33de13c4
-
SHA256
d5e518efcccc11bc6e29f1c5b89279ce4fdab95913ddab884306cc8ad0f8e7a3
-
SHA512
1c5bb62f28060c78c633b587a4afeed1ac0c6faead422a94a52463f5a3fb366a5489f2529b829e8d2c2e90859890404be1204bd9a9b2db7c61f46bbfcfd94e7b
-
SSDEEP
12288:EMha6lvswwPEr52DxsnECFePAYuH5vqUq/gM7aggZM/c8ZiJwmcYS+:FU62LmDwPQvfq/gMOo/c8ZiDHS+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2