General
-
Target
9191f5a9acd51585880fb47d8992aada6cfea3c7a9af9909cbd32eef49862acf
-
Size
656KB
-
Sample
250115-brwehsxrdr
-
MD5
20eab4da117b7ebad0bcff4d1ad652e5
-
SHA1
79255c5d759ae4c863baec1dfb14abe716f1c247
-
SHA256
9191f5a9acd51585880fb47d8992aada6cfea3c7a9af9909cbd32eef49862acf
-
SHA512
2b7e5829f20d992b5fd765bfcbb7d4a3b3902ef4bc595f0016fb016dd1d3977c2ac53c61fbd32219d59272d405352a34fb158cf56523a76f8979c77c7ea1ec47
-
SSDEEP
12288:eEAtK9wwc6omPlFvajBrXAWZFMZONdA8B2/7w6mIMQ5V2p4gZGj+oO/i:+tK9wwImP/+JAo2OY3ntj+o8i
Static task
static1
Behavioral task
behavioral1
Sample
NEW SIGNED CONTRACTS.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.stilbo.eu - Port:
587 - Username:
[email protected] - Password:
StilBO_#1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.stilbo.eu - Port:
587 - Username:
[email protected] - Password:
StilBO_#1
Targets
-
-
Target
NEW SIGNED CONTRACTS.exe
-
Size
719KB
-
MD5
c8c2b93f8b79377e5d346edfbf9504b3
-
SHA1
0e38e95f3cdba184363c9b2930a5f4d7d84895c2
-
SHA256
58800a690eb8217cf31f262261c856ceb8b73a580b1daab25f1cdac61394f918
-
SHA512
1d1dc875502359ee460fe6ad3437cfe3c511b9a18916a95f21ce3d5eae389b32029dc5f943d64f115cafaeb58d140b965a51bb5f6b837aadf0f1243c7d7fc571
-
SSDEEP
12288:ufZYRxA4Y5lyA/BxSPCn2m9ugFv4ji7X6RejFjb4+Z8ZLe9MQcIneW1caCoLXz4E:DRa2mAqUijSej9b4K+LccOeN4Xz4H1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1