General
-
Target
23a0eed35d69811a38633d41868a1fd6a20faf3912bde628eb556124fd6e5447.exe
-
Size
906KB
-
Sample
250110-rwdchaxjcv
-
MD5
3b1b99f3617bbe21d2bd1601e6ce73ee
-
SHA1
0ba6e0fe3c8f5a0511694421d841c377c1a4dae5
-
SHA256
23a0eed35d69811a38633d41868a1fd6a20faf3912bde628eb556124fd6e5447
-
SHA512
6eecd51eea9933faa504959f456707c0c132dbd2598b64830a94232a3a733550efadd03ff5f52c89c658bc016aee3328d429b2382d0b63559e49535cb4fde14b
-
SSDEEP
12288:cIR4R52J+XtwK0LgcOE7V8oL+SuEQD+Dr/POop6hvbJ30zWA0ylgrdm4Vz0Rppp5:cIeetgclptRK+v/tYlb5FA0y
Static task
static1
Behavioral task
behavioral1
Sample
23a0eed35d69811a38633d41868a1fd6a20faf3912bde628eb556124fd6e5447.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
Asaprocky11 - Email To:
[email protected]
Targets
-
-
Target
23a0eed35d69811a38633d41868a1fd6a20faf3912bde628eb556124fd6e5447.exe
-
Size
906KB
-
MD5
3b1b99f3617bbe21d2bd1601e6ce73ee
-
SHA1
0ba6e0fe3c8f5a0511694421d841c377c1a4dae5
-
SHA256
23a0eed35d69811a38633d41868a1fd6a20faf3912bde628eb556124fd6e5447
-
SHA512
6eecd51eea9933faa504959f456707c0c132dbd2598b64830a94232a3a733550efadd03ff5f52c89c658bc016aee3328d429b2382d0b63559e49535cb4fde14b
-
SSDEEP
12288:cIR4R52J+XtwK0LgcOE7V8oL+SuEQD+Dr/POop6hvbJ30zWA0ylgrdm4Vz0Rppp5:cIeetgclptRK+v/tYlb5FA0y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1