General

  • Target

    bf252b8ef4fb77ea9b7a7369d779f7bcb5160bb2af7d40859978b78d873400b4.zip

  • Size

    714KB

  • Sample

    240830-t5t3qavdpm

  • MD5

    7e02cd33b69710d4a99f467b81b5a428

  • SHA1

    cb045a5a91d8c8fddcddee5aaa2eda97c6db3274

  • SHA256

    218cae0dae3dc2245a8b155d1fb8a6c55c803fd0faa6059ea0d3eb541abb4bb9

  • SHA512

    58b3798479c9b4c3ed666f68218dcf31f73759bed04e5ce445ca6567d3c9c66f788d63b94b319d91340e7de6f40c86e646aa5c0ee9614b97ce7108305767bff8

  • SSDEEP

    12288:jWl78c48VQcjFshrGiB5anQHBAoBRU6Wsb1QRmopd1NPR0cW6SMCJtbGecVyRQzt:jWZ8c4QQcjFslB3HB7LBbemGnD0uqqYA

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      bf252b8ef4fb77ea9b7a7369d779f7bcb5160bb2af7d40859978b78d873400b4.exe

    • Size

      981KB

    • MD5

      bb21b9bc8eb02f11dfa61dd0b1fd3e23

    • SHA1

      4389be9b203db228114c15216511150525849e8c

    • SHA256

      bf252b8ef4fb77ea9b7a7369d779f7bcb5160bb2af7d40859978b78d873400b4

    • SHA512

      84ae7dbdec0f7925141b50b34f8f174f49a3713b398cc6318910921427ad1ae73b14d0673794785009c07e8bbf6a6f201d794ed539e6cea3eaa6d9bcdee4a380

    • SSDEEP

      12288:2LXTxqqEvq2zRbjGPswaUW1vfNaO5uTpaO9eXVKrPtK6p/qr+aUmvCFMQsbzZHcU:2LBkpjGP/avkOIFaO0IpK6N7nm6uBX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks