General
-
Target
ab5adac9bbd6d03a643246f9e9addc6d687b12852a8844922fbd8798ac1e033b
-
Size
750KB
-
Sample
241212-bk75qsvnfw
-
MD5
c98e78160a9c60bdb654567a1acfcdc7
-
SHA1
8575553a60364f1aa8760cf4a8aa236b95ca7c21
-
SHA256
ab5adac9bbd6d03a643246f9e9addc6d687b12852a8844922fbd8798ac1e033b
-
SHA512
ed7713b070486a2087ee5e3325c426703915db755a23f5f4b5c3fd637503daf5fec4dd12ea9b5d529ae4b433d93ed7b14c851c5a316ca362cf6851fdc2530bcc
-
SSDEEP
12288:jvThK5P/f3gOcEOkyUOBi9mxJ3vhFOmsNfhDMjv6dunLDI7BBdr2KBUyB4dfjdR9:jvQ5XfslifUr3vhFOBfCOuLErKy4jJnH
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER 300136710.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
PURCHASE ORDER 300136710.exe
-
Size
1006KB
-
MD5
a87229b37b8388f3687aaaa3c132ddf2
-
SHA1
1390ba7361af77f7d6dbe1b8613faaaec5bc8a47
-
SHA256
914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75
-
SHA512
ee8ff4c10150a3ea9fe5c2df88f353a7af28e462628602b7fd4e9f4be1e92445d31167ecfee01ae27e1579d800dc4a7b1e8d6dcbcef9944a37db36135096ecf8
-
SSDEEP
12288:12MKhM39TXsTAi2deLrLGAblJKLAP6ghYZ0zsEoxuj0A7JosuLsitF:0Maci2debGAnnLnzsEoAj0AFotLzF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1