General

  • Target

    2b50c5df81cc4af7689262cabd209ffbefc2984566e4e8070f7135a40729ccb9.iso

  • Size

    68KB

  • Sample

    240509-ltr5zsbe9y

  • MD5

    7783fe86579a380bc61cdc4470dd0fc8

  • SHA1

    8dd0213228872a897f604a19ea0eda3dfb85ae20

  • SHA256

    2b50c5df81cc4af7689262cabd209ffbefc2984566e4e8070f7135a40729ccb9

  • SHA512

    0aa925c3b6fb73f806198dc331778e5628b874ac359de3a99f15cc53f2999426d01b0c6d55821c54b14ca6c9cac1f762db909e49395f5dc2ce8f3a53f55a8dea

  • SSDEEP

    192:giRpwijIw1govv2jEVUZDuEDMD+Y3Pet3pltqE6Nb6/0vOS2336SQ:dvS7ZvrS86S

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      2b50c5df81cc4af7689262cabd209ffbefc2984566e4e8070f7135a40729ccb9.iso

    • Size

      68KB

    • MD5

      7783fe86579a380bc61cdc4470dd0fc8

    • SHA1

      8dd0213228872a897f604a19ea0eda3dfb85ae20

    • SHA256

      2b50c5df81cc4af7689262cabd209ffbefc2984566e4e8070f7135a40729ccb9

    • SHA512

      0aa925c3b6fb73f806198dc331778e5628b874ac359de3a99f15cc53f2999426d01b0c6d55821c54b14ca6c9cac1f762db909e49395f5dc2ce8f3a53f55a8dea

    • SSDEEP

      192:giRpwijIw1govv2jEVUZDuEDMD+Y3Pet3pltqE6Nb6/0vOS2336SQ:dvS7ZvrS86S

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks