General

  • Target

    94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc.exe

  • Size

    743KB

  • Sample

    240726-e7485swhmq

  • MD5

    86bf528a2f3b5313b407a0e30b3e8853

  • SHA1

    c4982d6595860f665ab690509d858c9da2fe5c2a

  • SHA256

    94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc

  • SHA512

    c340f9c3108d5ae948bb70c6ecdfbf5cf2bae29c4cbc333c179acf9b782e8c8dacb624b339583be220a1d91d83e0b24a962dcf32a6509134e4a9a6ec341ebd5a

  • SSDEEP

    12288:FYwEygw0UnKKekspijqztW6ouKjNuiFe6uKJHdWLtHb6N5xHe6OxvvY:Fqjiek2i606vKDFeWL2Hb6rx+6IvY

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc.exe

    • Size

      743KB

    • MD5

      86bf528a2f3b5313b407a0e30b3e8853

    • SHA1

      c4982d6595860f665ab690509d858c9da2fe5c2a

    • SHA256

      94b53c7dccd001b16198911a89943051770b4345ad19b437a1817c6816707ebc

    • SHA512

      c340f9c3108d5ae948bb70c6ecdfbf5cf2bae29c4cbc333c179acf9b782e8c8dacb624b339583be220a1d91d83e0b24a962dcf32a6509134e4a9a6ec341ebd5a

    • SSDEEP

      12288:FYwEygw0UnKKekspijqztW6ouKjNuiFe6uKJHdWLtHb6N5xHe6OxvvY:Fqjiek2i606vKDFeWL2Hb6rx+6IvY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks