General
-
Target
914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75.exe
-
Size
1006KB
-
Sample
250110-r5bv2azlbp
-
MD5
a87229b37b8388f3687aaaa3c132ddf2
-
SHA1
1390ba7361af77f7d6dbe1b8613faaaec5bc8a47
-
SHA256
914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75
-
SHA512
ee8ff4c10150a3ea9fe5c2df88f353a7af28e462628602b7fd4e9f4be1e92445d31167ecfee01ae27e1579d800dc4a7b1e8d6dcbcef9944a37db36135096ecf8
-
SSDEEP
12288:12MKhM39TXsTAi2deLrLGAblJKLAP6ghYZ0zsEoxuj0A7JosuLsitF:0Maci2debGAnnLnzsEoAj0AFotLzF
Static task
static1
Behavioral task
behavioral1
Sample
914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75.exe
-
Size
1006KB
-
MD5
a87229b37b8388f3687aaaa3c132ddf2
-
SHA1
1390ba7361af77f7d6dbe1b8613faaaec5bc8a47
-
SHA256
914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75
-
SHA512
ee8ff4c10150a3ea9fe5c2df88f353a7af28e462628602b7fd4e9f4be1e92445d31167ecfee01ae27e1579d800dc4a7b1e8d6dcbcef9944a37db36135096ecf8
-
SSDEEP
12288:12MKhM39TXsTAi2deLrLGAblJKLAP6ghYZ0zsEoxuj0A7JosuLsitF:0Maci2debGAnnLnzsEoAj0AFotLzF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1