General

  • Target

    a1ec77271287f41a17afdabdc3d2269a.bin

  • Size

    638KB

  • Sample

    240504-b3z7vada52

  • MD5

    1bbc764f8d00d120d0bf1c9748825d0e

  • SHA1

    a296db2339e6f51ab9227b15e50c76314d6ec1d6

  • SHA256

    7a316d013e1222bf4cd97332497b8e62e2023cbc0648f9224ec0ac7dc0dd2375

  • SHA512

    f1360d5ef37d9053357449addbd813e8ad5420aad82f0647f4fa4c34e71a36e9d648881103ae5d8947ebef374698f10720d2c98fbdc89b2828c975bef61b120a

  • SSDEEP

    12288:+x/WjSP2845anaSaA/fETZI227o5jf6Ya1r7pLCgX/MdBHPe7oiSi4RDUgnz:+xu184InLyZIsJyYaZZCgXUdkolRRAgz

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cojosem.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ZARHLOULBOSS123

Targets

    • Target

      Approved E-DO PDF.exe

    • Size

      698KB

    • MD5

      ccd1edccbd14c9c0245099ac2920be83

    • SHA1

      77a57f47e0660da5a2a1969392cf0aa962c5eed8

    • SHA256

      56f69825010da76642ee25cf55098c51f6ded6f6fe2718b6c69c1c4b74b57c65

    • SHA512

      af3b651c6cbd0752b001264b0ecbf7f254af2ae832b9d862f99b5fa818f540254c878b7b64d0f422e12029890584094fef73cf56c1ed5aa82dfe1e2fd77a0c47

    • SSDEEP

      12288:JO3/T3/fVrTtK3/y32K4J8wqCfqIP5Otr7VnYixibuRtgiTn+aEoQG527KCHftop:srXVrTtKqmfqClP5OVdY0iqRKuEG52er

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks