General

  • Target

    3cf1272bbb24cd63faf26b69ab0eaeec8ce789a9e59030cfa79e40150d8ae286.exe

  • Size

    721KB

  • Sample

    240514-trkbcsed84

  • MD5

    35373ea173fb999636a21ad039ce4951

  • SHA1

    d477aa5c029736ca08b927935c901c5f53d454ff

  • SHA256

    3cf1272bbb24cd63faf26b69ab0eaeec8ce789a9e59030cfa79e40150d8ae286

  • SHA512

    83c8ff6bbede26092b21be38caa110d640ad48130ac5e8f48f84f18ede855e81da43420d49efcc905ddc7e448cb8a2f4ea6d2390edd69a878a305fda9b73b834

  • SSDEEP

    12288:mfTeH81jJUDu3+6fov6jk6Jl859MCzjDgC9h0LImZ1tzRI4aP/kR:38MDhyjk6J659M2j8tImVRii

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3cf1272bbb24cd63faf26b69ab0eaeec8ce789a9e59030cfa79e40150d8ae286.exe

    • Size

      721KB

    • MD5

      35373ea173fb999636a21ad039ce4951

    • SHA1

      d477aa5c029736ca08b927935c901c5f53d454ff

    • SHA256

      3cf1272bbb24cd63faf26b69ab0eaeec8ce789a9e59030cfa79e40150d8ae286

    • SHA512

      83c8ff6bbede26092b21be38caa110d640ad48130ac5e8f48f84f18ede855e81da43420d49efcc905ddc7e448cb8a2f4ea6d2390edd69a878a305fda9b73b834

    • SSDEEP

      12288:mfTeH81jJUDu3+6fov6jk6Jl859MCzjDgC9h0LImZ1tzRI4aP/kR:38MDhyjk6J659M2j8tImVRii

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks