General

  • Target

    Shipping_Document-001222890.exe

  • Size

    782KB

  • Sample

    231009-jm4jbsbd31

  • MD5

    f2fe88b581743e12a33d2218ea90c470

  • SHA1

    8538b393ee59d2e0fc286e23d8a1d999f3249f14

  • SHA256

    1f22495e0f459d46c901746a490c146552173cb83d629bdb694f5961c09be657

  • SHA512

    4596943cd12032dbcd8b962050fe43abff7c78030c471b6df56644ffa95bfd27ea0a1a42adedfc188c3933f0d33ba190f26de98ecc8347a2633c5b1857a21a35

  • SSDEEP

    12288:Ktx1TuJM7w/QwacdVS6j4xgZYv/cNoPLx+hkQPFtF:iJZw3Nj4hcePLxukQPF

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Shipping_Document-001222890.exe

    • Size

      782KB

    • MD5

      f2fe88b581743e12a33d2218ea90c470

    • SHA1

      8538b393ee59d2e0fc286e23d8a1d999f3249f14

    • SHA256

      1f22495e0f459d46c901746a490c146552173cb83d629bdb694f5961c09be657

    • SHA512

      4596943cd12032dbcd8b962050fe43abff7c78030c471b6df56644ffa95bfd27ea0a1a42adedfc188c3933f0d33ba190f26de98ecc8347a2633c5b1857a21a35

    • SSDEEP

      12288:Ktx1TuJM7w/QwacdVS6j4xgZYv/cNoPLx+hkQPFtF:iJZw3Nj4hcePLxukQPF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks