General

  • Target

    72d54df06cae1c5bdb3dabd71cf3e37435800616d359acefe73672ccd7501cf0exe.exe

  • Size

    796KB

  • Sample

    231205-wvvmlsec72

  • MD5

    8c74ef4787f3d56402bb591145205e7f

  • SHA1

    bfb1daa8d8f87f96c8063af636d2887fe46a7fae

  • SHA256

    72d54df06cae1c5bdb3dabd71cf3e37435800616d359acefe73672ccd7501cf0

  • SHA512

    6830cb76b3219fc7a068ce2b03724f1d3e6db01c263e2f283887fd3980c74b5099c0112e7a474ee7e07ea7081e56412c5eaeb7211e6299183474a37ae9bdc3b5

  • SSDEEP

    12288:n4E2Gf45+po29NZOaPLSoNMQlsgsxQYGI+giFieNJXSYGMdI+Ca7QFUqb:n4FP+pJ9NZOKLS7gIaI+gi5FCs

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      72d54df06cae1c5bdb3dabd71cf3e37435800616d359acefe73672ccd7501cf0exe.exe

    • Size

      796KB

    • MD5

      8c74ef4787f3d56402bb591145205e7f

    • SHA1

      bfb1daa8d8f87f96c8063af636d2887fe46a7fae

    • SHA256

      72d54df06cae1c5bdb3dabd71cf3e37435800616d359acefe73672ccd7501cf0

    • SHA512

      6830cb76b3219fc7a068ce2b03724f1d3e6db01c263e2f283887fd3980c74b5099c0112e7a474ee7e07ea7081e56412c5eaeb7211e6299183474a37ae9bdc3b5

    • SSDEEP

      12288:n4E2Gf45+po29NZOaPLSoNMQlsgsxQYGI+giFieNJXSYGMdI+Ca7QFUqb:n4FP+pJ9NZOKLS7gIaI+gi5FCs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks