General

  • Target

    31e4af663f69863234fcf3dad00ff2da077825cf5e7213ec95f837db3af735f4

  • Size

    650KB

  • Sample

    240523-b8hjzshe23

  • MD5

    f294616759b5f74b43435dbae3a5e945

  • SHA1

    3f626b55e56a2ddb413cae83ac1585a79e345c8c

  • SHA256

    31e4af663f69863234fcf3dad00ff2da077825cf5e7213ec95f837db3af735f4

  • SHA512

    03080f01de76c312a9742e7dd94723d6dbb3e74ddab0a183ee0c9ca6ec465b7592bcccf72cfc45afb4b298904e4b2f2f936da78f6df91807776352bc1e767993

  • SSDEEP

    12288:nGyvBMYySbMWfezs3MjehyvLXBwAs0Dk5asd6nVUZGnSseBCtC+HCq:GGBjXMWf9MjVTaAstqxShlrq

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA Jan-Apr24.exe

    • Size

      680KB

    • MD5

      66228b6f5b149c3d52a20e0fa1b4ca17

    • SHA1

      779371603043c8b5bfcd1c1b5d921cf974fc352c

    • SHA256

      ac07c423bb0785b861795d5afdaa1ad0e433a6db747986ee3cfcebab6976f2bb

    • SHA512

      e42cae6af4715e3a9d50f921704012ee2e7cd9a68ae7f43bc35cb3ec86c1e7771f69bd31c0cd2f32cf789647eb67ca3198674c60c6cb3410f60b1e79aef0224a

    • SSDEEP

      12288:+RV5XBiMyStKGzeRs3MJehivPXB4Is0PkRaqd6xl8tGnKse/MdCHJkR:YHBThKGzhMJHnuIsDytKht0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks