General

  • Target

    658e2f44c6e3a6af989069dc2fc82337c326fe751e037161e1c780c9bc639c4c

  • Size

    763KB

  • Sample

    240522-cwlljshd39

  • MD5

    7dfb952c184cd0e1d8ad2df971a83986

  • SHA1

    a3d2cf69513c7d7ddd020eb11ad40c5ee790fd28

  • SHA256

    658e2f44c6e3a6af989069dc2fc82337c326fe751e037161e1c780c9bc639c4c

  • SHA512

    be9a46365483bdb02751fa4237e08685b3184b23d93f99b039a3f66a0496feeeb8a83ba2cf37a25fda7ca701d44f36f1fd834893be1fdd55d966d360d35ca77c

  • SSDEEP

    12288:yz+I6yWn7fcpVZlu/6uH30nEZ+ym9ENATN9O/P8xGkFp+DjwT8rHDFXVz4X6YG1y:/I698VVY30nEB09YEGkx47hlznI

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      658e2f44c6e3a6af989069dc2fc82337c326fe751e037161e1c780c9bc639c4c

    • Size

      763KB

    • MD5

      7dfb952c184cd0e1d8ad2df971a83986

    • SHA1

      a3d2cf69513c7d7ddd020eb11ad40c5ee790fd28

    • SHA256

      658e2f44c6e3a6af989069dc2fc82337c326fe751e037161e1c780c9bc639c4c

    • SHA512

      be9a46365483bdb02751fa4237e08685b3184b23d93f99b039a3f66a0496feeeb8a83ba2cf37a25fda7ca701d44f36f1fd834893be1fdd55d966d360d35ca77c

    • SSDEEP

      12288:yz+I6yWn7fcpVZlu/6uH30nEZ+ym9ENATN9O/P8xGkFp+DjwT8rHDFXVz4X6YG1y:/I698VVY30nEB09YEGkx47hlznI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks