General
-
Target
aa7e0932069694a1e9e98868f0128d3de3bcee0de7591f12cfc491fa91fc0dd6.exe
-
Size
810KB
-
Sample
250111-fds5fsvkcv
-
MD5
0fbd42eaa6018baee8d8d62c2523763c
-
SHA1
2721894c14665ebf180e94f42b5c352ac62ea7e0
-
SHA256
aa7e0932069694a1e9e98868f0128d3de3bcee0de7591f12cfc491fa91fc0dd6
-
SHA512
12b8df1904d1c97e6658e2ab56723c65122940b22ced7950bb4d1079fceb45c7155fc58f4dd1f2e610db4a001fcdb12d9f22dc92e4615c3ae133def1ea84230a
-
SSDEEP
12288:egmEIAB7wrQ3Hb13rbJxGnDEFc2WJp/pc0X3rgkesXQgMbA4cD6TOgO0:WE9r37rxGn4FcNJcogk9qcDw20
Static task
static1
Behavioral task
behavioral1
Sample
aa7e0932069694a1e9e98868f0128d3de3bcee0de7591f12cfc491fa91fc0dd6.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
[email protected] - Password:
TsHZsTv}Jnj5E5Bn - Email To:
[email protected]
Targets
-
-
Target
aa7e0932069694a1e9e98868f0128d3de3bcee0de7591f12cfc491fa91fc0dd6.exe
-
Size
810KB
-
MD5
0fbd42eaa6018baee8d8d62c2523763c
-
SHA1
2721894c14665ebf180e94f42b5c352ac62ea7e0
-
SHA256
aa7e0932069694a1e9e98868f0128d3de3bcee0de7591f12cfc491fa91fc0dd6
-
SHA512
12b8df1904d1c97e6658e2ab56723c65122940b22ced7950bb4d1079fceb45c7155fc58f4dd1f2e610db4a001fcdb12d9f22dc92e4615c3ae133def1ea84230a
-
SSDEEP
12288:egmEIAB7wrQ3Hb13rbJxGnDEFc2WJp/pc0X3rgkesXQgMbA4cD6TOgO0:WE9r37rxGn4FcNJcogk9qcDw20
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1