General

  • Target

    749a4c15aabfeb0b7b500e33e952ce83c1d4c6b868ff17cf0a5b3fe25223b074

  • Size

    642KB

  • Sample

    240522-chsspsgh48

  • MD5

    6d035e2a5532c3a243625d41326d74df

  • SHA1

    0b53ea9b502fcc1747e4bcb1e9dbe78946136e28

  • SHA256

    749a4c15aabfeb0b7b500e33e952ce83c1d4c6b868ff17cf0a5b3fe25223b074

  • SHA512

    91cea912009b7c0ab6e6ce6ec3dfb8668e5fa54a80b60bb872b6b7b81142a985b0b1966b3132a597e9c5253d59840192780c5ba206a1ddf29fa9b7fb86a51592

  • SSDEEP

    12288:PcyLkYifTINq+udapKkZ1ZKEYayN12jo3ZO5YQy2ULVcyymLQ:kyIYi8UkpKkZ7DyN12pURHymLQ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      URGENT REQUEST FOR QUOTATION.exe

    • Size

      673KB

    • MD5

      f00f7c52552aaf2410ff3082fa37daeb

    • SHA1

      881b033d370728d7abd1b833517bf3c0cfc8d2c8

    • SHA256

      8fb777d3216834be1787eb6b32f538983ba82ce75af5925d714036f8d70a2914

    • SHA512

      b3d4ccaeb3dcf94962c529bd00ee5b2fe7f956215ef2fd71578e35e75c62a0ca4f466c72292c820ec1313c2fa819cff34e579f8d4151a0e5711b0c06e291d571

    • SSDEEP

      12288:9fYifTnzq6udapuUZ1Z1rFAHPaoq2LLU2GlreaaDyco0wwkR:9Aiz0kpuUZ7UH9erWyoC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks