General
-
Target
932a9d7b2aaf4bf741ab52af310f53c9d6af40caaecbf3edf0ebf2b1c05c296a
-
Size
680KB
-
Sample
241218-bg56zawkbt
-
MD5
1354c7c01972c780487febb30a5a3eef
-
SHA1
b60e36e28a398ae0aaaf5ec2005207ed622fd95e
-
SHA256
932a9d7b2aaf4bf741ab52af310f53c9d6af40caaecbf3edf0ebf2b1c05c296a
-
SHA512
2e16b4b6cfafb5ef5fa5ed9a706d01b4e7be302f990defa66f79441f39367a87bc3807672dec200414fe88ec18248b548f19ff99c0a20751572447463a4430b2
-
SSDEEP
12288:/rxvkjfHnTFdKu2qjDy4pCHXfIhQYi++05tzQlDz19J9JaEG:YfhUqjDZpCHP4+0jMRR39JI
Static task
static1
Behavioral task
behavioral1
Sample
JfsmpBIQ1LgMUAk.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6852245174:AAHgk_9s-tH6YNacTaCnQz56uJMggI0fZDw/
Targets
-
-
Target
JfsmpBIQ1LgMUAk.exe
-
Size
927KB
-
MD5
652d25f38f4ed183acf9b013cb2a2275
-
SHA1
7c8860477a60b6332f2bc71a585e9886dac153f6
-
SHA256
39631d4807643ffd35ec654d308f01a920fef38ba977d94969cbd6bdeb81b607
-
SHA512
d92c7cd916f0c429370e7bcfaa6fb373268083de2190081971bb9b95f6bf6efea402d54ea9a3d2419d570dc1b02ab2129387c906c428aba44ec245bffc6d970b
-
SSDEEP
12288:S54f2Vu4HSyBykosI4DS1zAfm+c238ZF4DyzpUpMTgyQEbMPku+l0CPP:m447yr4izAfo2MH4DyzpKzvVPd+p
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1