General
-
Target
1047cf8fbc49544a7b163dd0442f7662460f3cf979fed4f1c35167bdc70577a8
-
Size
623KB
-
Sample
250129-bpec8azjej
-
MD5
969fca9f5c785119bd9121f782474b68
-
SHA1
0e918f3b2b4e8d610b450bc1576830640a0f4d44
-
SHA256
1047cf8fbc49544a7b163dd0442f7662460f3cf979fed4f1c35167bdc70577a8
-
SHA512
0ea3a3fea500f413a5ce87e08fbb80318446d39814dcc1b583aba419abda16f2555d13f6cd803fb1d698569182c89c9efc2ef37377690ebc9e970dfa9ff46b1b
-
SSDEEP
12288:tng2gBdF+8Zl63s0L/zUVpAWC1sfjJbDvVdbSQ+P:VK5Z8/jP+JbD6Q+P
Static task
static1
Behavioral task
behavioral1
Sample
Remittance slip 060223.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Remittance slip 060223.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Targets
-
-
Target
Remittance slip 060223.exe
-
Size
708KB
-
MD5
426e0fa17ee9518f05ab0ef0227c11c7
-
SHA1
9eec1531ebe6217f9bd54e585316129dae565d43
-
SHA256
103a24c03c526ba935708b1e870c75c5e26215c2d3ae87e4f4d91ead58aac960
-
SHA512
0347fac5f1ad1eb73875069171697cf44a9d4b097de8b4a112c4325c35cad622cb891bd7be4f72a2b28eb517caf1005152feb809259b84e33c3c40463b342157
-
SSDEEP
12288:3jUwLPEgqD39ZoCSN0wGApK9JWQwVKiBSpMKKM5pxA/VcjmdfE:oY7qz9SCKjG2yc9B+pvu/+jmu
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1