General
-
Target
c8d8329e36c85fc810f02363121ea1856e2e0dd229220f651c9f86d2bb64e9e0
-
Size
656KB
-
Sample
250114-cdlhtswkdl
-
MD5
4d2edb23dcdae2dc59ba24c1144985a4
-
SHA1
37552c1162b6884331259b4f55f5d6681b2bae71
-
SHA256
c8d8329e36c85fc810f02363121ea1856e2e0dd229220f651c9f86d2bb64e9e0
-
SHA512
96dc220faa8319ea605f57c2a343d9f3cf7baec51816fca2468bd4b49978456de5ac0844bebc781cab4b0a072c501d8c29398d8e14a938763318473fc2ca25af
-
SSDEEP
12288:hHQ4uTQUYkaRIkUGEQKBsIKCIQ6Wks4yL2gdA6DKtFKi510BabjOSDXrW:I00foK+IKqbL2gdA6unKe0c+SHW
Static task
static1
Behavioral task
behavioral1
Sample
1401MES_S Quote.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1401MES_S Quote.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
1401MES_S Quote.exe
-
Size
814KB
-
MD5
2956b5876da3f8bd63627358f39dd5bd
-
SHA1
c0df48ce532c6b5a7d846f62544d8fb8f1f571f3
-
SHA256
ae8d1fa58b33e9eddc5fdea9668efb2af4046b6d65d8fc34da8f70953ccd1549
-
SHA512
6910ebf57121b5c76f27e2e544e548649e9145ceb243fcbd05e8d7692a281755b9c81853b6f24add9e1017a79a9575f4420a4effb2fc06248589a8072bf7f714
-
SSDEEP
24576:aF8yNK1t4NK1tOqLBxq8l6umA84lWdOGAnkCQ2KfkMLx+:aKhjqR48ddiQ2KfkMLk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1