General

  • Target

    cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08

  • Size

    689KB

  • Sample

    240329-br2ljadg8t

  • MD5

    2f4cba8ab7e60939af72d2ba6c35e144

  • SHA1

    6f2de99caafe01e9e74f25cc932c2e72a15da575

  • SHA256

    cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08

  • SHA512

    8c3c1dfac4f0d843e6636a745b4d0eaeb5dc5be21dd56da4c0b7af92ac207727d8e0f8dc0bbfd3acba6591a336ddf09e243452684eb1e03cd7d65fcf619ce754

  • SSDEEP

    12288:q/VN0YOwqOp9TbVLiFl/KRQNTEj9rgWON9r1mLz8ar0s6PTQVBu:aO7MRL+xoQNn9BMgs6rY

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08

    • Size

      689KB

    • MD5

      2f4cba8ab7e60939af72d2ba6c35e144

    • SHA1

      6f2de99caafe01e9e74f25cc932c2e72a15da575

    • SHA256

      cc1402d5aa805ba0388e53cf51d075ce8eda9661afba3832d4356f5b16a7ba08

    • SHA512

      8c3c1dfac4f0d843e6636a745b4d0eaeb5dc5be21dd56da4c0b7af92ac207727d8e0f8dc0bbfd3acba6591a336ddf09e243452684eb1e03cd7d65fcf619ce754

    • SSDEEP

      12288:q/VN0YOwqOp9TbVLiFl/KRQNTEj9rgWON9r1mLz8ar0s6PTQVBu:aO7MRL+xoQNn9BMgs6rY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks