General
-
Target
57df2d88e39214fcb5c1b66a0705903c69bc78a4d8077b92d36890031bc863d0
-
Size
597KB
-
Sample
250108-bh331axlet
-
MD5
210fabb79b18bce1bfda1d156d85b710
-
SHA1
9f2bf2bac92397c4456ed2a25c7521514e4cbec5
-
SHA256
57df2d88e39214fcb5c1b66a0705903c69bc78a4d8077b92d36890031bc863d0
-
SHA512
9dad5c4280bf62e3c385408c4787ecfd4cb2a7b76afdfb09382bfeecd77f156a8b35e0b07e8e7505010008e5c3ebb7f4e6a55f5fe8d936ba616db8584f56e2d5
-
SSDEEP
12288:vet1fEY1X9xiJ3BqnGKJPSe0X6LrrCxwg0f5OORm9eYDJ6smxD:1Y59oJRIzPGKHr7hvoeYINxD
Static task
static1
Behavioral task
behavioral1
Sample
PO-000172025.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO-000172025.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
PO-000172025.exe
-
Size
765KB
-
MD5
63e5fa26f2990289dbf2ae9f09e090ea
-
SHA1
adb491d560c556f58856e3f0c3847d6c0e159372
-
SHA256
e7cb5402ee9747e820817d82e130f695c09fe2ea3e4f59ab6222c95df465dc2f
-
SHA512
2ea0c056efe183fe0d0b80f43e038aef3eac6146dae549644634e51c4534cf1e5e70cdd1f4059b9d85e2221b31f476b1379cbc8643d792d378cbba3653019464
-
SSDEEP
12288:Sa+WYMV+I4MVKWCGTM/Bcl8jaURD6q2ynTUttZqcUysM+I6Zz4cElHdgpUDs2baS:7+GRg+mxjhRD6MnTUtjlUxJz41hdgc35
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1