General
-
Target
daf10c89c8dc25375df7a03b6a866b8162e92ffd892d25c281b85016bec3b95f
-
Size
909KB
-
Sample
250122-bvhyla1qdp
-
MD5
4c04a68aaed564eab7211c7fd14dd564
-
SHA1
d49fd377aa87263cde549953847d3a15a3b9ee55
-
SHA256
daf10c89c8dc25375df7a03b6a866b8162e92ffd892d25c281b85016bec3b95f
-
SHA512
6270eda8019944b5571cf26183e47e6c0c01cdfd245def454240ecda0fa8b30ff2bfee5a72dec11e764cec26a22a4476ff67dcafbf757d9b80b8fc8632e11041
-
SSDEEP
12288:4b1TloJNhQ/cWS7stgfLhXv35ceqpCzowBjh4oDBBlA4pIPool3gpyWTZqhGkIBm:KiJN+UVsCfp35ctpCdDrbADmtDl
Static task
static1
Behavioral task
behavioral1
Sample
daf10c89c8dc25375df7a03b6a866b8162e92ffd892d25c281b85016bec3b95f.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/
Targets
-
-
Target
daf10c89c8dc25375df7a03b6a866b8162e92ffd892d25c281b85016bec3b95f
-
Size
909KB
-
MD5
4c04a68aaed564eab7211c7fd14dd564
-
SHA1
d49fd377aa87263cde549953847d3a15a3b9ee55
-
SHA256
daf10c89c8dc25375df7a03b6a866b8162e92ffd892d25c281b85016bec3b95f
-
SHA512
6270eda8019944b5571cf26183e47e6c0c01cdfd245def454240ecda0fa8b30ff2bfee5a72dec11e764cec26a22a4476ff67dcafbf757d9b80b8fc8632e11041
-
SSDEEP
12288:4b1TloJNhQ/cWS7stgfLhXv35ceqpCzowBjh4oDBBlA4pIPool3gpyWTZqhGkIBm:KiJN+UVsCfp35ctpCdDrbADmtDl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1