General
-
Target
492a6e78c52e03d832082a391b48a411c53b6319f569dfe94eabcf9e75de5e1f.zip
-
Size
704KB
-
Sample
241228-yccees1pgk
-
MD5
67fe077a775ec5725bfe7bd7ee1c5db5
-
SHA1
2cf5a925ed6739d9a291445cc52668ec1680346d
-
SHA256
581d2c6ae82f50d7cedfa6658752e351b5f242a94c6f444c4e9f091baaffeee6
-
SHA512
4544841a2b0134eab82c3e3fb12fca4ea29b502865ea9adf130e0490eccfa8dd40e0c1ee9045bae91fa22bcdd62cd6060c55c17077a5eba1d4415ac788d4a11b
-
SSDEEP
12288:hCLEZPDzB69CfTw8b9yIfXtscYOPRCtdP3pb0Q7fMG0KaN7snomSfnEIEOHhkXLd:hY0PDzQ9CvIgXt1YOJCtdP3pgQ7fp0/w
Static task
static1
Behavioral task
behavioral1
Sample
Quotation R2100131410.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@#
Targets
-
-
Target
Quotation R2100131410.exe
-
Size
773KB
-
MD5
9c93adc749374b8187372df173d3bc8a
-
SHA1
da72e8433731300cb4651d60909b850af47dcca4
-
SHA256
643ec0d1bf2ed36dd15a6eae87f1a570c88be0cae6ccdf7179f705edd3291d38
-
SHA512
bfe7f89ba5ec3ad5d53c0a69eeafec12c92cb7ba2d77611e9f5e5ada74fb1ce814841941ee5aeb2d91f2bd92f340b33c3acedbb5e64902b015fac4ba7645c64c
-
SSDEEP
12288:bPBXFKVPFA1uqHXgLf7fPE3J0j/eZGAs2IIZdyuVGmyns+WDlAk4FTIPGYy:jZFKNFAMqHXgr7EidAbtZdFVifCSIP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1