General

  • Target

    c8d9afec59fb4b38c9fbe3bb1a2a5937.bin

  • Size

    671KB

  • Sample

    240612-defjmszann

  • MD5

    ecfcb52c408813746146550ee3fd7bb1

  • SHA1

    234de3c62466a7918bb21b46957d0eb15777be31

  • SHA256

    684b414c6c0fcfeff61b4dee91dfee27a8ce9e9126e85fc6dd27fa0887004950

  • SHA512

    7ac455fe60e9a318af5eda6c975bbc1dd9fdcdf7d991c3c1e01c655bb509c8449acc787c695b6f57e417a91b4a942898041fb91c785dc639d51a908d9cc6a697

  • SSDEEP

    12288:wLuEO25wULgvAa9v9Fw4KWy9baNggIDxCtEGJFvW9m01tLd7iY2:wLlUz9Fw4KWseNg/n0Fuc0J2

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      c3135de6c77cb9f767977797316659bcc043ca15cca999599c92cd0d7f515154.exe

    • Size

      791KB

    • MD5

      c8d9afec59fb4b38c9fbe3bb1a2a5937

    • SHA1

      cf03154a48369bbe6bc50c8483df5a46668b160d

    • SHA256

      c3135de6c77cb9f767977797316659bcc043ca15cca999599c92cd0d7f515154

    • SHA512

      aa3f71fa58c2a1db0e2d3ef7133c58b60d65ed4f578f3b3ed18a3d39545daf680fceec328fe251d9c3464fd1c5c837572d2b5ef35cd7360ac534d54f246fb1a9

    • SSDEEP

      24576:yx7C3c6lJC67UFlPgs857LZedc8TVJVWrRPoW0pI4TgtY+VTIC:yBxFlPgn7LUdVfsNgW0G4TgtY+VTI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks