General
-
Target
a56444d990ec1e2c8c66f1089851863276162df05cacde31b8244c48bd0936ff
-
Size
1.0MB
-
Sample
250109-blm6ystqen
-
MD5
cee9706118ae9a195b469e678bcc1667
-
SHA1
b7f64fdd83e0d3bf9f9b0a8f3d37fd166522d9a4
-
SHA256
a56444d990ec1e2c8c66f1089851863276162df05cacde31b8244c48bd0936ff
-
SHA512
e45c7dbaf09dbc86415234c6e44f64db4ddf3cc38c199c5a98071248795805a8e3c5590703b817d71490c32c79d0c2ad8d11b531d4f43323b05438520cc25742
-
SSDEEP
12288:wiuI7/+1xpBmtHIQhhtK9CTSytK4DKYfzn4SA8d:wi7Qs53DK6eYfzn4SRd
Static task
static1
Behavioral task
behavioral1
Sample
a56444d990ec1e2c8c66f1089851863276162df05cacde31b8244c48bd0936ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a56444d990ec1e2c8c66f1089851863276162df05cacde31b8244c48bd0936ff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
@infinitY1234
Targets
-
-
Target
a56444d990ec1e2c8c66f1089851863276162df05cacde31b8244c48bd0936ff
-
Size
1.0MB
-
MD5
cee9706118ae9a195b469e678bcc1667
-
SHA1
b7f64fdd83e0d3bf9f9b0a8f3d37fd166522d9a4
-
SHA256
a56444d990ec1e2c8c66f1089851863276162df05cacde31b8244c48bd0936ff
-
SHA512
e45c7dbaf09dbc86415234c6e44f64db4ddf3cc38c199c5a98071248795805a8e3c5590703b817d71490c32c79d0c2ad8d11b531d4f43323b05438520cc25742
-
SSDEEP
12288:wiuI7/+1xpBmtHIQhhtK9CTSytK4DKYfzn4SA8d:wi7Qs53DK6eYfzn4SRd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1