General

  • Target

    9ece8d4fd8ea3f61861fa7d20d64cbe82f00573d9e66a028c6d7e2c9423926e6

  • Size

    812KB

  • Sample

    240329-b96cfafa26

  • MD5

    05b8c9291d4020dc85cf3b4358ac815f

  • SHA1

    3c24ab45013a24be5319f8db27353400ade2af03

  • SHA256

    9ece8d4fd8ea3f61861fa7d20d64cbe82f00573d9e66a028c6d7e2c9423926e6

  • SHA512

    c479f998e2d13031163d62f4af636ff9a9ade2227b6eff93b26904326fb9291a708f43b7a4347ff260260eae69d6783261b7e82bf98c1f7f7db9cccb7b2be130

  • SSDEEP

    12288:AkAEApRsBe9iyhEiL0shmP/hKl2QeKT3G484Qwygz6ozN8cTKYymBr4EoNant6iV:4pRssirdnhMneKTB84Wg2o5XhpE+t

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      9ece8d4fd8ea3f61861fa7d20d64cbe82f00573d9e66a028c6d7e2c9423926e6

    • Size

      812KB

    • MD5

      05b8c9291d4020dc85cf3b4358ac815f

    • SHA1

      3c24ab45013a24be5319f8db27353400ade2af03

    • SHA256

      9ece8d4fd8ea3f61861fa7d20d64cbe82f00573d9e66a028c6d7e2c9423926e6

    • SHA512

      c479f998e2d13031163d62f4af636ff9a9ade2227b6eff93b26904326fb9291a708f43b7a4347ff260260eae69d6783261b7e82bf98c1f7f7db9cccb7b2be130

    • SSDEEP

      12288:AkAEApRsBe9iyhEiL0shmP/hKl2QeKT3G484Qwygz6ozN8cTKYymBr4EoNant6iV:4pRssirdnhMneKTB84Wg2o5XhpE+t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks