General
-
Target
bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95
-
Size
4.5MB
-
Sample
250114-cayc8atkbs
-
MD5
84f2ddec7d3b7621f02776ad79b64e61
-
SHA1
b9fa3a3dabd8d64b958d8902f0bc77dd1d2385b8
-
SHA256
bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95
-
SHA512
8242bdff6dac52cc4773b19b1928fd6792f99956760dc17d563394b573c0d81ef4349d1924bb4147d5425da9a558c54665e2de5eb9dd18669c8c0e8aff72aab6
-
SSDEEP
49152:VZ4I/q2ksAuo5UonKzwjHP7iF0u3xl9hCY:DzXksFfoK8z7/aVD
Static task
static1
Behavioral task
behavioral1
Sample
bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@Mexico1.,
Targets
-
-
Target
bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95
-
Size
4.5MB
-
MD5
84f2ddec7d3b7621f02776ad79b64e61
-
SHA1
b9fa3a3dabd8d64b958d8902f0bc77dd1d2385b8
-
SHA256
bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95
-
SHA512
8242bdff6dac52cc4773b19b1928fd6792f99956760dc17d563394b573c0d81ef4349d1924bb4147d5425da9a558c54665e2de5eb9dd18669c8c0e8aff72aab6
-
SSDEEP
49152:VZ4I/q2ksAuo5UonKzwjHP7iF0u3xl9hCY:DzXksFfoK8z7/aVD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1