General

  • Target

    3f24b8845c43b9a8d469b7535e178189b12441426875858edff8c638c8ce31e5.zip

  • Size

    638KB

  • Sample

    240610-xebp8swdrd

  • MD5

    ba7669eaa5d29bfc1d9fb5790ddcb629

  • SHA1

    2b4b4d73b7a3229128f4a9feae4df72ca8dbea35

  • SHA256

    3f24b8845c43b9a8d469b7535e178189b12441426875858edff8c638c8ce31e5

  • SHA512

    c6b404bb86ddd0e0dbb27b2ff3aa4f1b01d69851f25a7679ba85748a367cc40f48798314a75c0151de287c1382eee13b87560d2fdf8024bfb8168d876cce82ac

  • SSDEEP

    12288:kLuIRjKUKoUZVXWnzgTrPM/D6S62XDrRmn/UCp606OdfMdbAT:EROcUZJWz+cDVzgcCp4Odt

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Shipping documents.exe

    • Size

      684KB

    • MD5

      594c88f0815435836775f4af6fd465d4

    • SHA1

      303d2f4a1b8ce101e9957c299ca57a4621d3a016

    • SHA256

      8fbf89ff9f1c63329f5251feed90590b8f3bd725e469b5afd25be717f3cb2ca9

    • SHA512

      b93bb4606ed5dcc87eeb06df6bb9acc6dee994e6c6456e33ca0671cc25f6026e19cf72532294dbacd04ab063113125a8748cde94b46ec9cf66eeaf6d4657c7be

    • SSDEEP

      12288:weATclGRjKCKooZVEhPkzIOiRv+NBTp/U2pQ3pRCXDuIJqyJMq40Bbf25kR:nackROioZCGsJOc2pYkX6OJP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks