General

  • Target

    6fde7f531438d2122f5b9b31f9aca0d1fbbef59e20d73cf81eac9b6250dededc.rar

  • Size

    717KB

  • Sample

    240522-b8ne8sgf81

  • MD5

    5c9d502a4a04531c2463732f2732c0cc

  • SHA1

    5b623c3b66c4730967fb689e4a96a1aa1406e419

  • SHA256

    6fde7f531438d2122f5b9b31f9aca0d1fbbef59e20d73cf81eac9b6250dededc

  • SHA512

    9b27ced6156546db428de4dbc1a9416bc59e96d12a087885b970ff3299daa224f41725adb35af6d998989efb924915d9aff07ae857f2ab9c8461feb2d49185de

  • SSDEEP

    12288:f+EXwCueQKeFcnplN3bs/OuCULH9dnMou55Wdchic3HpSWM2VwHWPp/:iCueQXOV3bseI5u5w6iOHH66d

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      invoice CHN1080769.PDF.exe

    • Size

      761KB

    • MD5

      77c6015c8c679abe8cd11cb51125f6c9

    • SHA1

      f9fd8a7f13b03480ae58622c228d6a6bb660f409

    • SHA256

      63219f4d5975bf956a1c5c8b98011f721cfb1e2b4894c6ec9f5a94d77e2652e8

    • SHA512

      510a8a2e2905eebd97bbda9e4cf183392b59aa18f9bb3278fed82fd10721ebc1ad06633992e6f4ee8b4eb64b4d89cf185aeab3b316d041ccb523c0d46110f52a

    • SSDEEP

      12288:YzDn6yWn7fcpVZlu/6uHD73sYw0WJv1/wHiksaGdt8qmUMbpG/IinMkqFozGrCWW:sn698VVYHst0WrTkGrpm4/nMHvv/QO4v

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks