General
-
Target
0e51a1fe337238a485ded423de1cad3e0ff8339256b3f57d398bcb4e93f77dd8
-
Size
1.0MB
-
Sample
250110-be78jswpes
-
MD5
80f4fe7424a399eb8cb5ca6a38b98ca3
-
SHA1
7c98eef90723bdae7e7a7048e4c73dd3ccee0d60
-
SHA256
0e51a1fe337238a485ded423de1cad3e0ff8339256b3f57d398bcb4e93f77dd8
-
SHA512
59e172a8f6b3565ad969c8ea76d26a9783da4eb480cb015e25eef645611a1f697770b663307e97a31f88619e1549c321d94d8314fecc85b1cab4f88a3f434f17
-
SSDEEP
24576:U/yKZ+uOOOgYGLW9VJhZ1Q7L3qL4qImtnkCZ9ZvGa5OHW:U/yK8uOOOgFLEv71Qf6rIykCBvGa5O
Static task
static1
Behavioral task
behavioral1
Sample
0e51a1fe337238a485ded423de1cad3e0ff8339256b3f57d398bcb4e93f77dd8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e51a1fe337238a485ded423de1cad3e0ff8339256b3f57d398bcb4e93f77dd8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.valtronics-ae.com - Port:
587 - Username:
[email protected] - Password:
YTMIlIR0
Targets
-
-
Target
0e51a1fe337238a485ded423de1cad3e0ff8339256b3f57d398bcb4e93f77dd8
-
Size
1.0MB
-
MD5
80f4fe7424a399eb8cb5ca6a38b98ca3
-
SHA1
7c98eef90723bdae7e7a7048e4c73dd3ccee0d60
-
SHA256
0e51a1fe337238a485ded423de1cad3e0ff8339256b3f57d398bcb4e93f77dd8
-
SHA512
59e172a8f6b3565ad969c8ea76d26a9783da4eb480cb015e25eef645611a1f697770b663307e97a31f88619e1549c321d94d8314fecc85b1cab4f88a3f434f17
-
SSDEEP
24576:U/yKZ+uOOOgYGLW9VJhZ1Q7L3qL4qImtnkCZ9ZvGa5OHW:U/yK8uOOOgFLEv71Qf6rIykCBvGa5O
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2