General
-
Target
6739b96efd3664782fc22bda6eada0c89447e5bddb03a247a09fef3549dca389
-
Size
791KB
-
Sample
250120-bhnnbavkcq
-
MD5
c43d130f64ed8ccf7250f2fa606a61ad
-
SHA1
abecfd29280f90e513d89412421c05b53eea0a09
-
SHA256
6739b96efd3664782fc22bda6eada0c89447e5bddb03a247a09fef3549dca389
-
SHA512
da059bae7625c7d683b85b543f8a79721551c4eb6096a1b3dfe8fc04212451719448d9b27eb628188b7c436c501b4aa6a44970b68e3e9aed995c0e961d49ee75
-
SSDEEP
12288:q8lWXV7OyWLIEQA5ifws28dLmRtbOEas9BHt711xdROvDSB1PJFVsE3LLwkR:qOHxYPT4Zas91t711gWbbL3
Static task
static1
Behavioral task
behavioral1
Sample
6739b96efd3664782fc22bda6eada0c89447e5bddb03a247a09fef3549dca389.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
@qwerty90123 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
@qwerty90123
Targets
-
-
Target
6739b96efd3664782fc22bda6eada0c89447e5bddb03a247a09fef3549dca389
-
Size
791KB
-
MD5
c43d130f64ed8ccf7250f2fa606a61ad
-
SHA1
abecfd29280f90e513d89412421c05b53eea0a09
-
SHA256
6739b96efd3664782fc22bda6eada0c89447e5bddb03a247a09fef3549dca389
-
SHA512
da059bae7625c7d683b85b543f8a79721551c4eb6096a1b3dfe8fc04212451719448d9b27eb628188b7c436c501b4aa6a44970b68e3e9aed995c0e961d49ee75
-
SSDEEP
12288:q8lWXV7OyWLIEQA5ifws28dLmRtbOEas9BHt711xdROvDSB1PJFVsE3LLwkR:qOHxYPT4Zas91t711gWbbL3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1