General
-
Target
invoice.r15
-
Size
643KB
-
Sample
250124-s4qs8sxjhr
-
MD5
edef7d9492184ae7595b1df994da929c
-
SHA1
09bb4da7038b2e52c5160588af803af0328f5086
-
SHA256
7b39be84d49d7f1c986d881c8c69cfc63e111c983d55106106959c6c1a83667a
-
SHA512
1311c0054a8a327968f535c7ef6feb737411ba72f04da50138a077feeca6e6fc698c48e9084b9bff58c50b2694b6cbc07faaa9f52f839f10a519e99de7c8be1e
-
SSDEEP
12288:veHwv28jrXWYg7mKjglMxhB7SYELfj5kQO3RTVZaw+gPUPcq:vYO283FCjIoRSZ+QOTHaZc0B
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Targets
-
-
Target
invoice.exe
-
Size
744KB
-
MD5
b0ebd9e6b7db75c09086f8917c7c6fbb
-
SHA1
7c4f8ce260d37433d15b972e90b8a2f112b8a316
-
SHA256
6626d5216b21933a5ccca366777e3fa81f6ab20fc642e39713698db5d28792ae
-
SHA512
3581a18d6f94c76982de58a27b238b4463d1cb7524ba0c121daceb6b607c3bf490b4bd5d6cc47b95d19be6ce6e9dd8eb7ab5e5d918e4703b49d0f9f76331e85d
-
SSDEEP
12288:oCyu7+JALQsACpMfRsBpdht5EEiT2e2UbeKkEyVTAa+jXUF5C3WUy482jmTMsoBM:m/JAQsLkRCnt5ZdayVTJ+jUFMdmTkM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1