General

  • Target

    EF25E5A164BA8A60440216EEE9BF9A9A9E876307F3F38B4E9E3EAE64015040F9

  • Size

    548KB

  • Sample

    221123-r211radb8s

  • MD5

    1512e7f89bc2b58e7f78479a988ff19c

  • SHA1

    07d8ce1c68d08139e756bb9ef53020e4cc65c475

  • SHA256

    ef25e5a164ba8a60440216eee9bf9a9a9e876307f3f38b4e9e3eae64015040f9

  • SHA512

    02d1b1e680620e9481ac41c80bd6a0cacc5026c548d74ff221ad1c4cadb75f328fa601dcae58371c740edfa02a48e5e625d3c4ed93e2cffd6a0c531887a2151c

  • SSDEEP

    12288:syuyJmaEZ+WbxGt+rXUepzP8AFasdsQ02KNm7KPBJ6Gws+kjpffmI:s/C37OxW+rPF/sJNVJ6Bs/z

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      bank copy.exe

    • Size

      719KB

    • MD5

      ff4026a77a99a313617c3c340d3df719

    • SHA1

      bcc53aa8607277724e62361991b0be371f074ca9

    • SHA256

      642313658b6a4952937dedb17038b00228c6ccfe6f8c4c4f478c7319e6071973

    • SHA512

      aa8f9231377f98772b8ebedfc88f2864ceca2c1fa2fae883404672afa97fcc8cae7da7f00e8a6ca6fc8cb1d0ec609da2bed3b6b38a6a152d36a2271da0b76140

    • SSDEEP

      12288:4MxXmahZxYbxWtlrYUeAzV3bbAsdsQ0SK7m7K4sHgcpCYrNZyl:7x3pwxmlrHdhs97cICQZ0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks