General

  • Target

    7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd

  • Size

    5KB

  • Sample

    240521-ef3k8sha4y

  • MD5

    9bb236cdb3b35307af7d461c7fb89080

  • SHA1

    c15e1237916d8b15f6123b1f5fe71bea8ca05145

  • SHA256

    7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd

  • SHA512

    ce235a07bde29a9317cde50b23f2b84b20c9463cce0f8a63f37385f03936b232029631596b7aab16137dacc6257478d805d73fef117f686e1c8a981010e739fc

  • SSDEEP

    96:QqROsb4v4l8zpMXx1LGkAo2ccqknNjD4VesDn5eoxDdHZ1bte+drO8CDnlufp:QTyK4l8za/LGAcqwD477fFLbte+U8CD+

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd

    • Size

      5KB

    • MD5

      9bb236cdb3b35307af7d461c7fb89080

    • SHA1

      c15e1237916d8b15f6123b1f5fe71bea8ca05145

    • SHA256

      7e82648e3ef3dbd61b8770817368ab2a475a2a7e0409acc7be80b725f72d03bd

    • SHA512

      ce235a07bde29a9317cde50b23f2b84b20c9463cce0f8a63f37385f03936b232029631596b7aab16137dacc6257478d805d73fef117f686e1c8a981010e739fc

    • SSDEEP

      96:QqROsb4v4l8zpMXx1LGkAo2ccqknNjD4VesDn5eoxDdHZ1bte+drO8CDnlufp:QTyK4l8za/LGAcqwD477fFLbte+U8CD+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks