General
-
Target
fe1daed50c5c7dda4e786a95583e59e9d5d963714ba91c7350877e6cd83e0748
-
Size
1.1MB
-
Sample
241124-betp6awlbs
-
MD5
cd93b224ee862a38e3d073d2bfc4e7fb
-
SHA1
88e2f26363506aafca9aebc889948253a9c1cca2
-
SHA256
fe1daed50c5c7dda4e786a95583e59e9d5d963714ba91c7350877e6cd83e0748
-
SHA512
a3850f2d17a1fe87ce94ce748126d3f8115e452acfa21a872abed0b7d086e9e13f5b33a3db577e51bd9febf3b6fd4d38a45a5d3fb31dbd6edaefbc241affbb8f
-
SSDEEP
24576:xO2j8/LL5X8jGW8Ii+oAZbY0xplJaHYTVQZPPIF:Q2j8PgBxoAS0BJIw2P
Static task
static1
Behavioral task
behavioral1
Sample
fe1daed50c5c7dda4e786a95583e59e9d5d963714ba91c7350877e6cd83e0748.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe1daed50c5c7dda4e786a95583e59e9d5d963714ba91c7350877e6cd83e0748.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.focuzpartsmart.com - Port:
587 - Username:
[email protected] - Password:
FpmJhn@2023 - Email To:
[email protected]
Targets
-
-
Target
fe1daed50c5c7dda4e786a95583e59e9d5d963714ba91c7350877e6cd83e0748
-
Size
1.1MB
-
MD5
cd93b224ee862a38e3d073d2bfc4e7fb
-
SHA1
88e2f26363506aafca9aebc889948253a9c1cca2
-
SHA256
fe1daed50c5c7dda4e786a95583e59e9d5d963714ba91c7350877e6cd83e0748
-
SHA512
a3850f2d17a1fe87ce94ce748126d3f8115e452acfa21a872abed0b7d086e9e13f5b33a3db577e51bd9febf3b6fd4d38a45a5d3fb31dbd6edaefbc241affbb8f
-
SSDEEP
24576:xO2j8/LL5X8jGW8Ii+oAZbY0xplJaHYTVQZPPIF:Q2j8PgBxoAS0BJIw2P
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1