General
-
Target
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f
-
Size
765KB
-
Sample
250108-bgxjtsyrbn
-
MD5
63e5fa26f2990289dbf2ae9f09e090ea
-
SHA1
adb491d560c556f58856e3f0c3847d6c0e159372
-
SHA256
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f
-
SHA512
2ea0c056efe183fe0d0b80f43e038aef3eac6146dae549644634e51c4534cf1e5e70cdd1f4059b9d85e2221b31f476b1379cbc8643d792d378cbba3653019464
-
SSDEEP
12288:Sa+WYMV+I4MVKWCGTM/Bcl8jaURD6q2ynTUttZqcUysM+I6Zz4cElHdgpUDs2baS:7+GRg+mxjhRD6MnTUtjlUxJz41hdgc35
Static task
static1
Behavioral task
behavioral1
Sample
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f
-
Size
765KB
-
MD5
63e5fa26f2990289dbf2ae9f09e090ea
-
SHA1
adb491d560c556f58856e3f0c3847d6c0e159372
-
SHA256
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f
-
SHA512
2ea0c056efe183fe0d0b80f43e038aef3eac6146dae549644634e51c4534cf1e5e70cdd1f4059b9d85e2221b31f476b1379cbc8643d792d378cbba3653019464
-
SSDEEP
12288:Sa+WYMV+I4MVKWCGTM/Bcl8jaURD6q2ynTUttZqcUysM+I6Zz4cElHdgpUDs2baS:7+GRg+mxjhRD6MnTUtjlUxJz41hdgc35
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1