General
-
Target
6f094aa75a8322555241fae3063c17075a6ed5166bfb41c9055c390278178d6b.exe
-
Size
779KB
-
Sample
250116-ddbjasxrgw
-
MD5
10a2684aae3f75a984dc63506e8ed8dc
-
SHA1
99a1ef344d13f5b44f3b0526f44072154e30641b
-
SHA256
6f094aa75a8322555241fae3063c17075a6ed5166bfb41c9055c390278178d6b
-
SHA512
4d001589415898b61f52f01a652a268e3919bc6ced17b12abfbdcc71c64e49f3bf92b00e0f89ed64f120600b95a79fec23406afa3f7b8587552bd270424b1526
-
SSDEEP
12288:/bdhloJNhQ/cWS7stavkg+t7di+u6VNPD0xvUPoCsTDW4nlpVOWN6fc/WwBZfvo:fiJN+UVsCkgOkQNPQ2oCsWys0xpBZfA
Static task
static1
Behavioral task
behavioral1
Sample
6f094aa75a8322555241fae3063c17075a6ed5166bfb41c9055c390278178d6b.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.stilbo.eu - Port:
587 - Username:
[email protected] - Password:
StilBO_#1 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.stilbo.eu - Port:
587 - Username:
[email protected] - Password:
StilBO_#1
Targets
-
-
Target
6f094aa75a8322555241fae3063c17075a6ed5166bfb41c9055c390278178d6b.exe
-
Size
779KB
-
MD5
10a2684aae3f75a984dc63506e8ed8dc
-
SHA1
99a1ef344d13f5b44f3b0526f44072154e30641b
-
SHA256
6f094aa75a8322555241fae3063c17075a6ed5166bfb41c9055c390278178d6b
-
SHA512
4d001589415898b61f52f01a652a268e3919bc6ced17b12abfbdcc71c64e49f3bf92b00e0f89ed64f120600b95a79fec23406afa3f7b8587552bd270424b1526
-
SSDEEP
12288:/bdhloJNhQ/cWS7stavkg+t7di+u6VNPD0xvUPoCsTDW4nlpVOWN6fc/WwBZfvo:fiJN+UVsCkgOkQNPQ2oCsWys0xpBZfA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1