General

  • Target

    728a0287e37a2829eb6a1ba56302db14.bin

  • Size

    674KB

  • Sample

    240512-derlxadb8s

  • MD5

    2ad0b854415f703acce1fdf72f33c2fc

  • SHA1

    a398212faa4ed4a1cecf7e9ea29c442d5c09ea2c

  • SHA256

    59b9471cd5a317f6d811ac2d033bd9c8cddd4f946494446316ee60ad08afb7e9

  • SHA512

    d8e6be8723fc38d9d7bdf104054fe7083387b4be485e41e7646ce4fa2b45d91adf0cb73aadb548cecafdd0e6d57d4cabddca4d92a0d7b822d6f3c1be0161d597

  • SSDEEP

    12288:KDhwjGHCl9zP/FEQy+hmiAyi4SLJRVqP1dIqhrqm9jDM3/CnivVWbyJWrVvwp:DjGwhEMeLJ2PAwWI+/CivVWBrap

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      aac4ee05a5f1436d0c89ef8a13bb1b39ce4cb3bd5d5be1cb5413581887290cc4.exe

    • Size

      1.0MB

    • MD5

      728a0287e37a2829eb6a1ba56302db14

    • SHA1

      ca7d616c2e358c99e137ac13f79f9f533524ad7e

    • SHA256

      aac4ee05a5f1436d0c89ef8a13bb1b39ce4cb3bd5d5be1cb5413581887290cc4

    • SHA512

      c74b142f98dedb1315203b061ddae9714eb64ac8000ff63a796efc43761ccd56af46fd8a9f7f2f95e06d82da1d5f1a012535c43bf49541f3b3a1f66ebdf37052

    • SSDEEP

      12288:1VLaID7XkuLPjNkKUaYNE/7qklO4EEZZivikgkX2tSQgnz+iDkR:1vcuTZLUHwqk9EEZZiGK2tQbW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks