General

  • Target

    AN.exe

  • Size

    730KB

  • Sample

    240904-ngklgsyfjp

  • MD5

    d72520639cb73d3364d7258c15518f55

  • SHA1

    6e1ebb649b0e00d4c8ebae01d481b4bd75b64eaf

  • SHA256

    ca9f996e829c1e7ad89c66f78bde33741d46a0b7ed03c8892f263937b0e6b400

  • SHA512

    207ab7047077f8c29ce24c46c2dc11ea5cbbbc2e00aa5955a3217518ffaf325c4cd2eb101be5d5885d9e78e6599402df7356bf4c02bd2bf8b32a3f62f9049be2

  • SSDEEP

    12288:Zb9eGY0igo17oLwnqDUMeEDAYERZu9Kt0ZoV54IqOVEOYCa0qCkR:Zb8G/q1csnIuEobu97a54INCOsB

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      AN.exe

    • Size

      730KB

    • MD5

      d72520639cb73d3364d7258c15518f55

    • SHA1

      6e1ebb649b0e00d4c8ebae01d481b4bd75b64eaf

    • SHA256

      ca9f996e829c1e7ad89c66f78bde33741d46a0b7ed03c8892f263937b0e6b400

    • SHA512

      207ab7047077f8c29ce24c46c2dc11ea5cbbbc2e00aa5955a3217518ffaf325c4cd2eb101be5d5885d9e78e6599402df7356bf4c02bd2bf8b32a3f62f9049be2

    • SSDEEP

      12288:Zb9eGY0igo17oLwnqDUMeEDAYERZu9Kt0ZoV54IqOVEOYCa0qCkR:Zb8G/q1csnIuEobu97a54INCOsB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks