General

  • Target

    699af4e8e4d2f3b3ab73268c846f4013f677bc183b9c561279f88c0239972b9b.exe

  • Size

    652KB

  • Sample

    240903-b8f16avenb

  • MD5

    c32f9ec932828cb58da2a9fde44a4635

  • SHA1

    e13e8202a7f83df99bacbf89bfc303c9d73a68a8

  • SHA256

    699af4e8e4d2f3b3ab73268c846f4013f677bc183b9c561279f88c0239972b9b

  • SHA512

    39a7affc06ba2f14e731688292d073784e6c40482e4222a1c061093a1464646427c294e4232b950637267f60f70ea2fa8d971cafcc556dabfcbf56d1bc13df1f

  • SSDEEP

    12288:199glhtubCawcYZP1Y663TmwQxzcnhApsyaoJYD/exqBfHVdGrtaEJmxzBI8y7tN:1dwV1STmwQxqroqD2xWVdGZmxzBI8C

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      699af4e8e4d2f3b3ab73268c846f4013f677bc183b9c561279f88c0239972b9b.exe

    • Size

      652KB

    • MD5

      c32f9ec932828cb58da2a9fde44a4635

    • SHA1

      e13e8202a7f83df99bacbf89bfc303c9d73a68a8

    • SHA256

      699af4e8e4d2f3b3ab73268c846f4013f677bc183b9c561279f88c0239972b9b

    • SHA512

      39a7affc06ba2f14e731688292d073784e6c40482e4222a1c061093a1464646427c294e4232b950637267f60f70ea2fa8d971cafcc556dabfcbf56d1bc13df1f

    • SSDEEP

      12288:199glhtubCawcYZP1Y663TmwQxzcnhApsyaoJYD/exqBfHVdGrtaEJmxzBI8y7tN:1dwV1STmwQxqroqD2xWVdGZmxzBI8C

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks