General
-
Target
PO581409029.exe
-
Size
632KB
-
Sample
250128-k77bdstqcz
-
MD5
7a63812ad6f56e95a8ab7499a96cb5be
-
SHA1
a194d62a3908c653fa3b259bc7fc0bf6f6d5b8cc
-
SHA256
a43a6421f9f5f7ac6ce878ceff99e594fadc983275f4f2f464341e5564784c70
-
SHA512
c4b258413a101b7c8d6c445bc926e894114e4f4a6ddfa736955297fdf33e160ff0c22667d23573a85e4377388a72305e6313f04a8a378090508f075cea71a19b
-
SSDEEP
12288:YjhQdV7rjuR62FhKcog3QSai6ceDx9QCRmWrFyD/dKzf:tdVnU62FcJsz8XD7vRmRA7
Static task
static1
Behavioral task
behavioral1
Sample
PO581409029.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO581409029.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
PO581409029.exe
-
Size
632KB
-
MD5
7a63812ad6f56e95a8ab7499a96cb5be
-
SHA1
a194d62a3908c653fa3b259bc7fc0bf6f6d5b8cc
-
SHA256
a43a6421f9f5f7ac6ce878ceff99e594fadc983275f4f2f464341e5564784c70
-
SHA512
c4b258413a101b7c8d6c445bc926e894114e4f4a6ddfa736955297fdf33e160ff0c22667d23573a85e4377388a72305e6313f04a8a378090508f075cea71a19b
-
SSDEEP
12288:YjhQdV7rjuR62FhKcog3QSai6ceDx9QCRmWrFyD/dKzf:tdVnU62FcJsz8XD7vRmRA7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1