General
-
Target
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec
-
Size
742KB
-
Sample
250110-bm7a8awrcy
-
MD5
1d0892c12a2e69230e60d6f195a0d211
-
SHA1
d02c13991e6d40047e6323e8f21743f9e6ab7bf9
-
SHA256
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec
-
SHA512
593208a2e0b7962af62c393fed71634e651c6920c4f6e604fbc208c735c60266702aeebd727e35cd63044240f3417f10a3b5b740cf0330f71c001e9cc370852d
-
SSDEEP
12288:fvPRL8Vyke763nEh7vqBdA0PCTem/8++s3fT5+9xBd9acP:F8Vyk2acyB/PCTz+s3r54x7P
Static task
static1
Behavioral task
behavioral1
Sample
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
alibaba.com
Targets
-
-
Target
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec
-
Size
742KB
-
MD5
1d0892c12a2e69230e60d6f195a0d211
-
SHA1
d02c13991e6d40047e6323e8f21743f9e6ab7bf9
-
SHA256
7a22706de45b3b503a6fa91723ae49dfd6e9a9cd55509bbe19685056fd34efec
-
SHA512
593208a2e0b7962af62c393fed71634e651c6920c4f6e604fbc208c735c60266702aeebd727e35cd63044240f3417f10a3b5b740cf0330f71c001e9cc370852d
-
SSDEEP
12288:fvPRL8Vyke763nEh7vqBdA0PCTem/8++s3fT5+9xBd9acP:F8Vyk2acyB/PCTz+s3r54x7P
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Turns off Windows Defender SpyNet reporting
-
AgentTesla payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
5Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2