General

  • Target

    Purchase Order_13102023.exe

  • Size

    523KB

  • Sample

    231013-qc2qbahh8w

  • MD5

    b5a70147c823327681c942174403ee66

  • SHA1

    855905c7cdffd746a9ce9866bb50a92afd3e79b8

  • SHA256

    b9acce3baff6363cf5ccfa55dbad67650905b856985de50829e65fa8a4be3d9c

  • SHA512

    c8c49aa51326a513aa3d19fefea33987840c845f800d1ac575414b36b93bd9f8beb5f8110fefbf2c0e6b4527d0342b68fc47de883d68050b0d58c6c393bacabb

  • SSDEEP

    12288:HhsDwXRze8VYS94Goso7GerOpDfN4jQk8l7fdict:6gzexS9aOf0Y7Vict

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Purchase Order_13102023.exe

    • Size

      523KB

    • MD5

      b5a70147c823327681c942174403ee66

    • SHA1

      855905c7cdffd746a9ce9866bb50a92afd3e79b8

    • SHA256

      b9acce3baff6363cf5ccfa55dbad67650905b856985de50829e65fa8a4be3d9c

    • SHA512

      c8c49aa51326a513aa3d19fefea33987840c845f800d1ac575414b36b93bd9f8beb5f8110fefbf2c0e6b4527d0342b68fc47de883d68050b0d58c6c393bacabb

    • SSDEEP

      12288:HhsDwXRze8VYS94Goso7GerOpDfN4jQk8l7fdict:6gzexS9aOf0Y7Vict

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks