General

  • Target

    dd198badcb4ccf61a7e3b74015f9e2491442c698ba164821b9da3de94ea160bd

  • Size

    663KB

  • Sample

    240613-c7e8xavgjk

  • MD5

    b371c0cedb35134bd01140506e1a1996

  • SHA1

    d7a5783524a6087549c54ba212927c4ce6169b11

  • SHA256

    dd198badcb4ccf61a7e3b74015f9e2491442c698ba164821b9da3de94ea160bd

  • SHA512

    419d6c6e5c82ce8b262c332727028922f874f3afcca5210cd22b6c92932fc2a0828057ed6277d03bde6bf7a1e5cf06905d62ae9dedd19738d4be85cc14dc3311

  • SSDEEP

    12288:FSkIV8CmbZNDp8+8WLc7YBd9qlZcU5/Bo+65PNYd6TeuCG9kk89Sk2X:FSVV8TbPDWYc74dzYG5t2d6TeuC59hK

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      new inquiry 756564388.exe

    • Size

      753KB

    • MD5

      e2616e5db25d1d56369b2353e2858a09

    • SHA1

      32673a86272a13051f31d3a1cb7b0f4feb24bf01

    • SHA256

      f8adf6e66d98c552826f03dd2f5762f8b0b20e7fb5d3ed4f3c3f706f4b89bbe0

    • SHA512

      9b55d586ab5dfd87c3c6801cb513f00ef3b0a2165b4dc31db4c5d550bdd34d605970c0eb00366955c066d535d67444ce3bc9caf746008ab9fae1882170bbac9b

    • SSDEEP

      12288:BdXtfET1T8+mb9NDp8Q8WLc2a1WaZhBERKOeDJa2kR:Bd921T8nb7D+YcN1zbqcO3t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks