General

  • Target

    7d7df676602a9235025bdcc7f5e550d532f294d6e4bd2195e12390e342bccd32

  • Size

    672KB

  • Sample

    240523-cxzvkaae8s

  • MD5

    b61f68ef968ddae3a9743437fdd26f88

  • SHA1

    3af6f1f6047cbe9319239875f7cc601185d32c94

  • SHA256

    7d7df676602a9235025bdcc7f5e550d532f294d6e4bd2195e12390e342bccd32

  • SHA512

    1d86da57cfaf9697cda684c294da9cc71525e4cc51d9eb8c73eff182ddac5644c2a28887328d408c0e3d12583eba57ce525d08069a28da438475cb9817b33778

  • SSDEEP

    12288:JzDi8LkpEaNB+shFpO31Yw3v2KL9sfHdYrtnoWTKx7FO/fv0Qsb/LkR:JzmjEcB+sbpoSw3JCdY19mQ/fv0QW/O

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      7d7df676602a9235025bdcc7f5e550d532f294d6e4bd2195e12390e342bccd32

    • Size

      672KB

    • MD5

      b61f68ef968ddae3a9743437fdd26f88

    • SHA1

      3af6f1f6047cbe9319239875f7cc601185d32c94

    • SHA256

      7d7df676602a9235025bdcc7f5e550d532f294d6e4bd2195e12390e342bccd32

    • SHA512

      1d86da57cfaf9697cda684c294da9cc71525e4cc51d9eb8c73eff182ddac5644c2a28887328d408c0e3d12583eba57ce525d08069a28da438475cb9817b33778

    • SSDEEP

      12288:JzDi8LkpEaNB+shFpO31Yw3v2KL9sfHdYrtnoWTKx7FO/fv0Qsb/LkR:JzmjEcB+sbpoSw3JCdY19mQ/fv0QW/O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks