General

  • Target

    e0a3b97566feb5eae0ee4e68c62b909491458321b6b89abaf62d1413a8ff4535.exe

  • Size

    687KB

  • Sample

    240529-q4jzksgd21

  • MD5

    fe00001d0db956e36c44daf67d62bab6

  • SHA1

    64f6a10011a7a0abbec380ccbf7a14b0d6f9d3fe

  • SHA256

    e0a3b97566feb5eae0ee4e68c62b909491458321b6b89abaf62d1413a8ff4535

  • SHA512

    8b42838ef1fe9eb1d758e292742e9fe273a54a07a4a6cecd77468a931ebb79bb280a47ac6a45164b4a3f2be21de1073e5f8734202a8e32eeb226539715423dfc

  • SSDEEP

    12288:SfCVmyE2ov9tg9M2SQEpGExrCwKEE5KrdYc8LzeGqI6c1BLy0CxLlIL1VeiewNON:dmn2ojg93zEpHrCwKwdYc8Jl1BpCxCI1

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      e0a3b97566feb5eae0ee4e68c62b909491458321b6b89abaf62d1413a8ff4535.exe

    • Size

      687KB

    • MD5

      fe00001d0db956e36c44daf67d62bab6

    • SHA1

      64f6a10011a7a0abbec380ccbf7a14b0d6f9d3fe

    • SHA256

      e0a3b97566feb5eae0ee4e68c62b909491458321b6b89abaf62d1413a8ff4535

    • SHA512

      8b42838ef1fe9eb1d758e292742e9fe273a54a07a4a6cecd77468a931ebb79bb280a47ac6a45164b4a3f2be21de1073e5f8734202a8e32eeb226539715423dfc

    • SSDEEP

      12288:SfCVmyE2ov9tg9M2SQEpGExrCwKEE5KrdYc8LzeGqI6c1BLy0CxLlIL1VeiewNON:dmn2ojg93zEpHrCwKwdYc8Jl1BpCxCI1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks