General

  • Target

    3012b1cdc6d41423e99d57dac314df023f3e993fd42ee66f09553827ff616c79.exe

  • Size

    690KB

  • Sample

    240604-lml1dsch32

  • MD5

    ecfbc6343e85f36fda76a7b66a342475

  • SHA1

    59dd4a689d6e5fd4d07cc780a88d0b4902f369ee

  • SHA256

    3012b1cdc6d41423e99d57dac314df023f3e993fd42ee66f09553827ff616c79

  • SHA512

    2f635e264db29bdd871af05742e2695f65bc2fbad76e6736cccbed7495b1a9d5e81766a7fcd7844ec66898065a3f80d1130d48df3a3d27d3f99cc9baf19b4e2f

  • SSDEEP

    12288:EHm21680skSKSIwz4lvmi3vcso51aAO/CDebcxz/2R6iouQNvyKhkfZC614IpBK:EHp1680JSNIG4lvHcso515bN/2T45hwx

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3012b1cdc6d41423e99d57dac314df023f3e993fd42ee66f09553827ff616c79.exe

    • Size

      690KB

    • MD5

      ecfbc6343e85f36fda76a7b66a342475

    • SHA1

      59dd4a689d6e5fd4d07cc780a88d0b4902f369ee

    • SHA256

      3012b1cdc6d41423e99d57dac314df023f3e993fd42ee66f09553827ff616c79

    • SHA512

      2f635e264db29bdd871af05742e2695f65bc2fbad76e6736cccbed7495b1a9d5e81766a7fcd7844ec66898065a3f80d1130d48df3a3d27d3f99cc9baf19b4e2f

    • SSDEEP

      12288:EHm21680skSKSIwz4lvmi3vcso51aAO/CDebcxz/2R6iouQNvyKhkfZC614IpBK:EHp1680JSNIG4lvHcso515bN/2T45hwx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks