General
-
Target
609bc44c18519741abb62259b700403e05cc0fd57b972ef68ca6ae8194d27f2a.exe
-
Size
902KB
-
Sample
250128-g39n6szmdt
-
MD5
e9462162ef8333e2452c5fa0f767d397
-
SHA1
169162aa4ac1764e051f1444bf22313e527eb5a0
-
SHA256
609bc44c18519741abb62259b700403e05cc0fd57b972ef68ca6ae8194d27f2a
-
SHA512
9f86b523a8851c42dd428b0038ccfd592d3d726b3485cdbc8805bb307142f313212168be356bcf0bc6bdb8f7242df8d5a08e287fbc5ccf3553a409427dbd6e8f
-
SSDEEP
24576:KWv3tv3GuXDFa/Q56oFiUrGJq5o5R3X3N:5vNTeQ56oL4CeH3N
Static task
static1
Behavioral task
behavioral1
Sample
609bc44c18519741abb62259b700403e05cc0fd57b972ef68ca6ae8194d27f2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
609bc44c18519741abb62259b700403e05cc0fd57b972ef68ca6ae8194d27f2a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
609bc44c18519741abb62259b700403e05cc0fd57b972ef68ca6ae8194d27f2a.exe
-
Size
902KB
-
MD5
e9462162ef8333e2452c5fa0f767d397
-
SHA1
169162aa4ac1764e051f1444bf22313e527eb5a0
-
SHA256
609bc44c18519741abb62259b700403e05cc0fd57b972ef68ca6ae8194d27f2a
-
SHA512
9f86b523a8851c42dd428b0038ccfd592d3d726b3485cdbc8805bb307142f313212168be356bcf0bc6bdb8f7242df8d5a08e287fbc5ccf3553a409427dbd6e8f
-
SSDEEP
24576:KWv3tv3GuXDFa/Q56oFiUrGJq5o5R3X3N:5vNTeQ56oL4CeH3N
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1