General

  • Target

    0.eml

  • Size

    894KB

  • Sample

    240618-jsq57atgqc

  • MD5

    9a510d91e306d168ca7f3bea659da5f3

  • SHA1

    8988997e6db253cbc1623745defa82d58865e58d

  • SHA256

    a8922e65fd8276f0a9f0a0ebf2ce97c3ce521ebfb490d1c2db8a750b97979f7c

  • SHA512

    7abb2ce8484122613579840d9ac265ca7b38167e3710a8b36d4a98bc77af5fa6cd56f60a03b39116ba66f800a3fb4883ab45347c1761619e7969f4630e472721

  • SSDEEP

    12288:sbL0Cf7YnfSG25EzI0H9LE4rfsq5DMHdjY+C1T3u3VHiUrtqIGvKb2CfqPBDxk7Y:+0CQ3zBHK4rOV1C1CCjBZxk7VC

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      DHL Package Documents clearance.exe

    • Size

      690KB

    • MD5

      06f29001ddc852a2880b8ece673ff24c

    • SHA1

      f80a254ba85b9531da05c74a12a8235ef8a359a1

    • SHA256

      87c68756481a2bbd821e8ac224087c5626ffdc1e05eaaeff506bb0b5148bba0b

    • SHA512

      95020cd917b98919d3960090209bbd754739cc247ffd0497cbf0edd0142ab7c86d668f6617b9f47c8e375dc323508bb42d38fe2c44eca4b56524835e0b40527b

    • SSDEEP

      12288:D2iNvFIsPAYDDNvkm7TuIQvQatxuJlV3D677qZAu+IPlatsXqdcW:D1DIK7DNvj7TuIQY3X3e7uZAuExdc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks