General
-
Target
905d39fb9da393f7f2127d11e60860e6faa3aeed8dcaff56f2d8fa09c9a04902
-
Size
1.5MB
-
Sample
250102-zksxtayjcr
-
MD5
154cea95b1314884e0f13970b14ee3a0
-
SHA1
d83cbd17b513dafbc13e409f045a203783126089
-
SHA256
905d39fb9da393f7f2127d11e60860e6faa3aeed8dcaff56f2d8fa09c9a04902
-
SHA512
8a5637060c0d6c6b3f06bdc9884acc4225f5b064f1c942c13a070bf05feae7429c6cd13136200f5554536475f55c76022867cc142764f7b928fb5c3c4fe78752
-
SSDEEP
12288:o7M3VrW5dVFDb8E6nf2SfSEcDiaQfzWhAWnrxcrCclWrzuGwVtB1L9:o7M3VsdVFfXEcCsNraDUfuGwP9
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Confirmation.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/
Targets
-
-
Target
Invoice Confirmation.exe
-
Size
810.6MB
-
MD5
63395033fc8d13ddd17e74e4bb13d5d6
-
SHA1
0a65c313504c8bcac8dc2eec944dd078a71ce384
-
SHA256
c322c179201974d21315230539606d1292a9159527f3f2eafa9d6167e8f51ae2
-
SHA512
4a1eb33f370ac2ba32bea1af287abe753edfa63e493e9045960303b1990c1cbdb289dd3ebd273ff87ad68b912b4e016877dd3f78b8ed5ce373a3f20b581a0718
-
SSDEEP
12288:mIR4R52J+XtyfG+Lzb6C65feSfSecDAMEnLwh8aFfxc1C0rmZdXm8qzd9p2MIR:mIeeJfG+LNzecKiVfaBiHXU9pTI
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1