General

  • Target

    70e8cdcccf80f8e69de0e00aa2cd6f9c9fb3a92a8ebba13db248567575936658_JC.rar

  • Size

    505KB

  • Sample

    231011-ne7m8sbc5v

  • MD5

    be537ede52f63efe72f92880f9bb66fb

  • SHA1

    4ddd098ecaf09dd30b62e9222a0b9b430c5504c2

  • SHA256

    70e8cdcccf80f8e69de0e00aa2cd6f9c9fb3a92a8ebba13db248567575936658

  • SHA512

    0a409594825f0cdd47f4692c80a3b90850539bd7755c9b54fc974e8680acbf73666052e444362cd4f251bc8e07ba321429c00b626ad094cb335e064fe0f93852

  • SSDEEP

    6144:1bv1z3yvEzFVrjRIjm2R/HXyYbvkon+leW26I78EWHcVhGxCI56RhF4fqEbeUFNs:5J3yvKrI/HH+efnWHcXGxCGq0eUG++

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Bank Information.pdf____________________________________________.exe

    • Size

      532KB

    • MD5

      a4630655240e626711a0f8da0632faa2

    • SHA1

      d78c7254d8a950e7949c3c6688a2e0d3ca5f7ae7

    • SHA256

      c7834a1e61260b87156453c5281e2dc6f922d6ffdced1cec6ad2c5507680fa17

    • SHA512

      6faea860a67580ac36aa068a136281f03e4c3da23d75549d33870ec3ceeaf2ffc279d317ce0277ebe202c21be93b87d3239bd7b2a2f244c682c3f378f188d582

    • SSDEEP

      12288:no725beEJZumKYWe0nnPa++iUqFPyGKcHukimfS30:njEEabesnPBvUUyVmi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks