General
-
Target
d4a4e4c891bacb6ffa8884695d7d757d8dbbae18ec64370bac3f6ecc024ea334.exe
-
Size
963KB
-
Sample
250111-f2d1fawlct
-
MD5
4d77d26b50bea6a8755808eb5bec3044
-
SHA1
19383419c4a21e39c46852059ae240e8ab6cc12f
-
SHA256
d4a4e4c891bacb6ffa8884695d7d757d8dbbae18ec64370bac3f6ecc024ea334
-
SHA512
2064f545989e2936dec55a7d894b4dc03aefebc112310e2e9797a130d4625cceb709e3739876b82c90fe236e100f5b31768c73472e53b9835ed8b6be77ecc521
-
SSDEEP
12288:EjlIpHtMPku+l0CPPPJAhajNglP1FmS+jxSCMz+5vET5TVw/AQgMQ60kzodR67Ls:EjlIhSPd+pTgl1wS+jv56bw2V6+eAF
Static task
static1
Behavioral task
behavioral1
Sample
d4a4e4c891bacb6ffa8884695d7d757d8dbbae18ec64370bac3f6ecc024ea334.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
d4a4e4c891bacb6ffa8884695d7d757d8dbbae18ec64370bac3f6ecc024ea334.exe
-
Size
963KB
-
MD5
4d77d26b50bea6a8755808eb5bec3044
-
SHA1
19383419c4a21e39c46852059ae240e8ab6cc12f
-
SHA256
d4a4e4c891bacb6ffa8884695d7d757d8dbbae18ec64370bac3f6ecc024ea334
-
SHA512
2064f545989e2936dec55a7d894b4dc03aefebc112310e2e9797a130d4625cceb709e3739876b82c90fe236e100f5b31768c73472e53b9835ed8b6be77ecc521
-
SSDEEP
12288:EjlIpHtMPku+l0CPPPJAhajNglP1FmS+jxSCMz+5vET5TVw/AQgMQ60kzodR67Ls:EjlIhSPd+pTgl1wS+jv56bw2V6+eAF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1