General

  • Target

    NPCC Enquiry ref (RFQ)- GPO-16- 0101-CPF- MR-PSD-16-055-Request For Quotation OGC-PR-16-6000000351.exe

  • Size

    983KB

  • Sample

    240429-ler7faff2s

  • MD5

    56d373b5443c15c4f2709ded9aedc848

  • SHA1

    d37b67bb8a6edf795793d10b007ee3fa79745ab8

  • SHA256

    7ed6e1978285b46db8a796f0df455c0843046e117eca2e41231b8dc0231fdfad

  • SHA512

    bdece2e7dd0739fde11288b5e2b833bf5f77bcfaea4ab106d43ded1c733bbeca64941603d630fd3d1179c548ec679cf5e7baea5c62f837b1f9be5fbd4961b35c

  • SSDEEP

    12288:utqItUpkwHobEdEufPj9JBnuMOlk0P7E/fjhfrLns+7vhKY+mzbvDh:kBtzwHobQEgPNwkKs7hfHnN7vhKmzTd

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      NPCC Enquiry ref (RFQ)- GPO-16- 0101-CPF- MR-PSD-16-055-Request For Quotation OGC-PR-16-6000000351.exe

    • Size

      983KB

    • MD5

      56d373b5443c15c4f2709ded9aedc848

    • SHA1

      d37b67bb8a6edf795793d10b007ee3fa79745ab8

    • SHA256

      7ed6e1978285b46db8a796f0df455c0843046e117eca2e41231b8dc0231fdfad

    • SHA512

      bdece2e7dd0739fde11288b5e2b833bf5f77bcfaea4ab106d43ded1c733bbeca64941603d630fd3d1179c548ec679cf5e7baea5c62f837b1f9be5fbd4961b35c

    • SSDEEP

      12288:utqItUpkwHobEdEufPj9JBnuMOlk0P7E/fjhfrLns+7vhKY+mzbvDh:kBtzwHobQEgPNwkKs7hfHnN7vhKmzTd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks