General
-
Target
0d9e21d6eb02948a93db81058241523b4fae4829a5103f849dfa3f5a7589a3b3
-
Size
585KB
-
Sample
250121-bmjj6ayncr
-
MD5
592f3bf5174face4924f06826232f5d7
-
SHA1
41b938aec0ce4dc3c2cd51f4fd6cfb179c6f91e6
-
SHA256
0d9e21d6eb02948a93db81058241523b4fae4829a5103f849dfa3f5a7589a3b3
-
SHA512
08108647893d3b329f6687c9cce663abfb209713c684f02becce535946ab1267f6b605fa2b53673346e4864f80b37e493a78100632ebef619f79b3bac4e36964
-
SSDEEP
12288:IjAoi6GW18uuGL+f+ywDcllmvIeMNg72hjIJoZ/emcZg/nC8pWCXITwY622fPnzo:ILixH3f+ywOWISyFVZcJ8pWCXNx22fPE
Static task
static1
Behavioral task
behavioral1
Sample
PO82200287.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO82200287.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
PO82200287.exe
-
Size
702KB
-
MD5
f5d02c1e0fcb07210fa29d619aba3f95
-
SHA1
be19ce3e4390cbce546a68b117819a883b3e8b3c
-
SHA256
2ab1f0af5cc8de412943944f3fd714aac575ad57063340031c7743e180c220c7
-
SHA512
bd11a7d041f3046c0d3d4f73c19e223b1ab8e1c93e6c0cfa294d9e2e4ffe599f519abdbd18233a9b5fa2b8734cdaa60b445d1466e21de9e257dd2fb978e99e3d
-
SSDEEP
12288:p5X6WhRSUunaOekRi2S4OlVr0pzKecjsUw9Acs8shaIqEoRLh/hK7wd:f6Nn0PFYpeegcvsEIohU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1