General
-
Target
e61e1535431cacb704cc984489140fe5fcae543eaf17da800806108d5a537302.exe
-
Size
654KB
-
Sample
241124-cx37zswjdm
-
MD5
3cbc22fc044e1a92339bab1d2bfe5144
-
SHA1
15af99c5b6f2a5a8e534b6ecff5f173e3e0fda62
-
SHA256
e61e1535431cacb704cc984489140fe5fcae543eaf17da800806108d5a537302
-
SHA512
5a2d61ee0dbb5ed1f94c45d1640ff24a31393ffae3933a858178d36fab5f45b19cc9958979f9a446d10a9491ab4b4f34e4ecaba9393c148b123f8a4f1f65a78d
-
SSDEEP
12288:R3HI6PVxWARv62mJ2n9EYYDT4LuSiI7kplagS5q0LXrwm:hHI4VQcCLJ29Ek97ilTS5ZLbv
Static task
static1
Behavioral task
behavioral1
Sample
e61e1535431cacb704cc984489140fe5fcae543eaf17da800806108d5a537302.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.normagroup.com.tr - Port:
21 - Username:
[email protected] - Password:
Qb.X[.j.Yfm[
Targets
-
-
Target
e61e1535431cacb704cc984489140fe5fcae543eaf17da800806108d5a537302.exe
-
Size
654KB
-
MD5
3cbc22fc044e1a92339bab1d2bfe5144
-
SHA1
15af99c5b6f2a5a8e534b6ecff5f173e3e0fda62
-
SHA256
e61e1535431cacb704cc984489140fe5fcae543eaf17da800806108d5a537302
-
SHA512
5a2d61ee0dbb5ed1f94c45d1640ff24a31393ffae3933a858178d36fab5f45b19cc9958979f9a446d10a9491ab4b4f34e4ecaba9393c148b123f8a4f1f65a78d
-
SSDEEP
12288:R3HI6PVxWARv62mJ2n9EYYDT4LuSiI7kplagS5q0LXrwm:hHI4VQcCLJ29Ek97ilTS5ZLbv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1