General
-
Target
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
-
Size
854KB
-
Sample
250125-bp5keayjcs
-
MD5
c583ce216c5a0a982d0aa8ccb8956d5d
-
SHA1
595f8330a3da759f08fe0b59d5b46aaf54071684
-
SHA256
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
-
SHA512
4f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79
-
SSDEEP
12288:6cbLIx2zGRbVk69o340h2x4ZydRXLzT6wpPzOK3q:62fex79ooomNLiwzOK6
Static task
static1
Behavioral task
behavioral1
Sample
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
-
Size
854KB
-
MD5
c583ce216c5a0a982d0aa8ccb8956d5d
-
SHA1
595f8330a3da759f08fe0b59d5b46aaf54071684
-
SHA256
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
-
SHA512
4f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79
-
SSDEEP
12288:6cbLIx2zGRbVk69o340h2x4ZydRXLzT6wpPzOK3q:62fex79ooomNLiwzOK6
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1