General

  • Target

    08e3ad6f807c73a6b31acc8003badb8c10fba174b8e7d69b3e4bbaaa25359d4d

  • Size

    763KB

  • Sample

    231207-pn1rqaaf36

  • MD5

    60b28af7efbde62165d11f036d0ced72

  • SHA1

    f67d7150181472827e1c2ac86bb850f24d168fc9

  • SHA256

    08e3ad6f807c73a6b31acc8003badb8c10fba174b8e7d69b3e4bbaaa25359d4d

  • SHA512

    9e7351761fbf84340b73d8f2754196101e7091693a7743aac0ead075e21e167b841c22e1f4f68caa6c83be1c68487ed5ff4a08b50ce6535598b3b85ea44d9dfd

  • SSDEEP

    12288:NdRjLOtIBLhKjM0qiO0zEkpynwL23ftBLlYOxA92l60lp+xGvsFlBblcAyWJWNct:NdJkIBLhKjxqzaEtwL2VBLlYIA92l60c

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      WIRE TRANSFER.pdf______________________________________________________________________________________________________.exe

    • Size

      974KB

    • MD5

      b624b22306191a4001991e6a98a7633c

    • SHA1

      f519bef2574df8f8a8d0fc5d19f029c72d9a1182

    • SHA256

      a2d18105194e15ef86987c3eba487d3c98e4ffcc9f5df8fff8c2c71559729641

    • SHA512

      114151d9dcb4c24168602beb97671dd9e733ab4e49771132ffff18f41d598246b096b751e266347267593539843b0a1967a34547298c1190c2a9626ab1a23edd

    • SSDEEP

      24576:uxK/cSUHegxG2VBxlYC6l27o0lp+h/tynfCr:uxsm+gQclYCrka+h/tNr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks