General

  • Target

    purchase order 21029.exe

  • Size

    718KB

  • Sample

    240617-qwth2stanb

  • MD5

    d78328c74038f352a3fc925869c72a6f

  • SHA1

    40add36f173997516722233a7f77e6d5820059a0

  • SHA256

    67478aaae5e89afc20d6e29500da5a1a3a9c266976a4aae255fe9ebbe4aeef58

  • SHA512

    f0931df42e13e5ce3b77d5cde4532dc21cfe5cc1625b89eab5992687d33ece3baddda95d45ade93ca401605163be2990af8eb6ffccd926fd7154e5e593d7468e

  • SSDEEP

    12288:hxK2iNPyCK2xrOomU7kmHS3fbjX3GQDwcpgPGEgA3ltVHkPcoN7QHNqSTmG:O15yC5m4SvbjX398td3ltVVoN7QHNqSP

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      purchase order 21029.exe

    • Size

      718KB

    • MD5

      d78328c74038f352a3fc925869c72a6f

    • SHA1

      40add36f173997516722233a7f77e6d5820059a0

    • SHA256

      67478aaae5e89afc20d6e29500da5a1a3a9c266976a4aae255fe9ebbe4aeef58

    • SHA512

      f0931df42e13e5ce3b77d5cde4532dc21cfe5cc1625b89eab5992687d33ece3baddda95d45ade93ca401605163be2990af8eb6ffccd926fd7154e5e593d7468e

    • SSDEEP

      12288:hxK2iNPyCK2xrOomU7kmHS3fbjX3GQDwcpgPGEgA3ltVHkPcoN7QHNqSTmG:O15yC5m4SvbjX398td3ltVVoN7QHNqSP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks