General

  • Target

    09a05f539ec775eae392cd5635963507bb9fff8ab855fd2481bdd687b8d2cf08

  • Size

    597KB

  • Sample

    240628-b875msxdql

  • MD5

    5c7e470a7891dd49bdf0fc5aca3a3dd1

  • SHA1

    2b86e6335430b90d2b676f98d1d620c3fc6c6057

  • SHA256

    09a05f539ec775eae392cd5635963507bb9fff8ab855fd2481bdd687b8d2cf08

  • SHA512

    63e894b6bf0e8e3ce0007eb87383381b6c1a93dba64ea1fecb0cd11fb37c58d95f8343ff065ca2f281f47463e57812cd2125d9ae44af99713cd8999e9775633a

  • SSDEEP

    12288:oq9Ok8KhU2RmHIa4u8bDrlB2KCNk1c5E8sPxX0V0F5upBQFvrdTuX:19JDt4HIa1Kpi8cGPxX0VlIt4X

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Mould clamp bolts quotation.exe

    • Size

      652KB

    • MD5

      2c9ada063e59aa030e6bcffe5905660a

    • SHA1

      1b64074fb0fce4d6c490ca149c2231ebb16d44ad

    • SHA256

      67522f9195f70de8b7a1cd137f3dcd7d751187071bb3fca9ebf58ad60f099533

    • SHA512

      a65cb2234f7769265fdadcf00ef2d3114671531ea9f46a5524be4bc12baace46ded4cce0be36fa4fbf9e3ffc8670d0557940e9634eaa015788819f64926ab00f

    • SSDEEP

      12288:o99glh3nbCaw89gkyKhkdmpIwCu8bxrll2KwNkdc5yUSnxl0b0F5ehzr5Q:oUw89jRkcpIwrQp06c6nxl0b/PQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks