General

  • Target

    67f529dd5840b8cfa3b8c08d4ff21f6767fda83343a508536ce7a9a643198f0f.exe

  • Size

    690KB

  • Sample

    240327-cxaknsae59

  • MD5

    6c2fcc66d281280088deb182ae48ea5d

  • SHA1

    a64cd89bfe73242065fd1d60fb710e61b870eb1c

  • SHA256

    67f529dd5840b8cfa3b8c08d4ff21f6767fda83343a508536ce7a9a643198f0f

  • SHA512

    e776a3216b7747739e1fc55f3dc96f187794c9a274993b7d73feed8577cbcb8d78ec1a94b2026d3420d637f6b7cec85924af2e45022b9257c28cc92b1d6fb9b1

  • SSDEEP

    12288:6C+yOa5WFHDvl5XI+aKkX6AqcnjJYvd/OHxDdQHgtttxGsP:drqVjf/kXEcnFIFYdxP

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      67f529dd5840b8cfa3b8c08d4ff21f6767fda83343a508536ce7a9a643198f0f.exe

    • Size

      690KB

    • MD5

      6c2fcc66d281280088deb182ae48ea5d

    • SHA1

      a64cd89bfe73242065fd1d60fb710e61b870eb1c

    • SHA256

      67f529dd5840b8cfa3b8c08d4ff21f6767fda83343a508536ce7a9a643198f0f

    • SHA512

      e776a3216b7747739e1fc55f3dc96f187794c9a274993b7d73feed8577cbcb8d78ec1a94b2026d3420d637f6b7cec85924af2e45022b9257c28cc92b1d6fb9b1

    • SSDEEP

      12288:6C+yOa5WFHDvl5XI+aKkX6AqcnjJYvd/OHxDdQHgtttxGsP:drqVjf/kXEcnFIFYdxP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detects executables packed with SmartAssembly

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks