General

  • Target

    e15e52fcb81395733818343b8ece6377.bin

  • Size

    6KB

  • Sample

    240509-d33n3sgc7s

  • MD5

    8a0872548f88815f1b3ab1a728e1893d

  • SHA1

    72e74302fab2bdc099374537d64b037f8082ff20

  • SHA256

    3226afa8c695aac5717295d0cdb984cf1a37023e49c8301c9ca722c133e9a8b6

  • SHA512

    fd94016f0afd671cec249ae7f686024ed80a76090e2cefc7fccd415a813145e7baf786ab3181f0c9835402d3aaab6b7ba9738066b3cf3e2080ec976e3cec00be

  • SSDEEP

    96:7VarmLEw74vE6qipPru+aQKuO+py+flx6NNceBqqsh+TEjf+G0QY3Lr3/Yx+boag:3R6qF+NKF+c66NNcqNgTyQiQEw

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      46a58ae7fa97e17a30c6031d4777fd9afd0a64385b131abd18750310a8223ed1.vbs

    • Size

      10KB

    • MD5

      e15e52fcb81395733818343b8ece6377

    • SHA1

      e595c6f83b63de54e8a62b38ce51b6e75e40d14a

    • SHA256

      46a58ae7fa97e17a30c6031d4777fd9afd0a64385b131abd18750310a8223ed1

    • SHA512

      eaee0355a05ecbdbdca3e2c17a47aebc987b4e03c2ea44cb8e4f56b67a70e3ecd080b26d10ecde01e3fe626fa42114b3d5ba39fa63b44d25ec48c9ed0f9ed973

    • SSDEEP

      192:30BhclM+TvETdQ+aTXtMFEOcKT1cW7C2EV+qNBNQh4b+:k7cPTvETdCUu81cQkN/BK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks