General
-
Target
e3783a7abfc49d276cb5db561457e08abdda40ef10ce6e1bee4b6bf3b0e4688e
-
Size
596KB
-
Sample
241217-bgzn7awpgp
-
MD5
e6b24ebe5455a475ff0b3228f0cab49e
-
SHA1
22710a2be546250d63e3fa069d183fbbda91ad86
-
SHA256
e3783a7abfc49d276cb5db561457e08abdda40ef10ce6e1bee4b6bf3b0e4688e
-
SHA512
d8bfda2f6598f1ff6dd258469877784e879364c7e30604c9c7032860e761a0dff1223365c2655ce2c7e957126825641c99719e33fc62cd6ad83dc6dac731893d
-
SSDEEP
12288:rW0FzWlF/5G9mHYoiMCbqA75AD/1z8vokPEsVBejoDGKIyqAKa:rhClt9gpbqkAtMssfejz7yqAF
Static task
static1
Behavioral task
behavioral1
Sample
e3783a7abfc49d276cb5db561457e08abdda40ef10ce6e1bee4b6bf3b0e4688e.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7220431026:AAHszs0XzPcajloTXlLJDVKab99uNUvPaok/
Targets
-
-
Target
e3783a7abfc49d276cb5db561457e08abdda40ef10ce6e1bee4b6bf3b0e4688e
-
Size
596KB
-
MD5
e6b24ebe5455a475ff0b3228f0cab49e
-
SHA1
22710a2be546250d63e3fa069d183fbbda91ad86
-
SHA256
e3783a7abfc49d276cb5db561457e08abdda40ef10ce6e1bee4b6bf3b0e4688e
-
SHA512
d8bfda2f6598f1ff6dd258469877784e879364c7e30604c9c7032860e761a0dff1223365c2655ce2c7e957126825641c99719e33fc62cd6ad83dc6dac731893d
-
SSDEEP
12288:rW0FzWlF/5G9mHYoiMCbqA75AD/1z8vokPEsVBejoDGKIyqAKa:rhClt9gpbqkAtMssfejz7yqAF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1