General
-
Target
9f2b06a5d492309cf77d733de90f608137768aa23391fc124342800ba0227d85
-
Size
681KB
-
Sample
250121-ffhrhaxma1
-
MD5
74f873140812d011828afdaa9fde9d05
-
SHA1
88d442f547edc7a8a66e9d8e387ebd5be6351862
-
SHA256
9f2b06a5d492309cf77d733de90f608137768aa23391fc124342800ba0227d85
-
SHA512
d6f0459d9ec6259de48cdbcd29f8b6affd2e5320c1ae2d965360701be45c478776a9df6e2ea3cbabb9688c25d175e668284405cf572687c4b174da7b37dcc5ff
-
SSDEEP
12288:meQl9XNqpyoKtyXfvL8SW6+0nh8gymF0l2IR6WdQiYL/T+4X60j:Gl9XNqxUyXfvH+kDF0lloWdQ7b+4Dj
Static task
static1
Behavioral task
behavioral1
Sample
FOR 817 4429601.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6852245174:AAHgk_9s-tH6YNacTaCnQz56uJMggI0fZDw/
Targets
-
-
Target
FOR 817 4429601.exe
-
Size
851KB
-
MD5
cbcac7423afa2b0dc72712763a4e1eb3
-
SHA1
39f3a89371412b93e4cdb7df7212c0290e4bfd22
-
SHA256
e085c2b585c5a43e93001485c6ec2fe56e9cd8b7b509f971ff0072c7f1a1a99e
-
SHA512
9456ff5bf3ca861644232b43dc5afba6ac853a73bd9ba2d2257c0c333992dbfeca3ac8268ff8bb2d4d8265f9bd3665fd2bf6ef46c3b95b0b1edd74ecee4972eb
-
SSDEEP
12288:KKOlbxrh0IO8DfymhIB5HPAw0nhAaoKF0l2XqbVRr+QHZjcXUpS8tJP:O/fymm5H4w0XF0lyqXtjuUpS8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1