General
-
Target
b47e72e03eb6ddd05d55f2652aefec3ac4e7bda2589dce2e77de1190dd50e48d
-
Size
676KB
-
Sample
250122-bpph7a1jbx
-
MD5
23cc1539734da4723052146197b88923
-
SHA1
f0da76b38da0af315eb9052557acb5e903497330
-
SHA256
b47e72e03eb6ddd05d55f2652aefec3ac4e7bda2589dce2e77de1190dd50e48d
-
SHA512
2d61df154889a6ba0f3baf799fa20f7d2c5bda183b82284087223f93dede5a057896c6e8a5a14b9890121664d402ad2b690e0b2bbbdc02f9ab935852b0ccadb0
-
SSDEEP
12288:sBLs2y6zUdJnuFKX4U9ziudlcfpjjddmXvWGAd0i6itcKx/DYP/snN3u:sBLXUP2e4U9ziu3ABKf8dhdZLkkN+
Static task
static1
Behavioral task
behavioral1
Sample
DEBIT NOTE.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
DEBIT NOTE.exe
-
Size
814KB
-
MD5
7a7e834ea89b19e19f1aa30292d62e1a
-
SHA1
65592bbd225f06b83d5eebf94a0095de42d4439b
-
SHA256
93a8bd4fcc556b618d8a05bd91767daf022f0bc4392a41472f1550024dfd12a3
-
SHA512
f86da69d17018887587b919cb70c960931a319f22c8e806542804b7b3248722b2dbb80a91d8b51d0f306336a57a3130233424df8d14515ae31e8a8cf90aacb47
-
SSDEEP
12288:nrErIO8Df6+oNXJ2W4A9zVLOBZMcfh/mIuBA0Ti8dea43s0icK8xwxBth:noYf22W4A9zoMAQRGshVzN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1