General

  • Target

    ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a.7z

  • Size

    657KB

  • Sample

    240911-lq1b7avbmd

  • MD5

    9c4a181aa969c73e4f680031b2790a06

  • SHA1

    8537083071d732ab2f0ebcd85d3c9f3e5e960fd2

  • SHA256

    ab95c554ad24a0e65fae5e7827bf05bd669194997fdd9584975cb391749a028a

  • SHA512

    573671d939622086213d471c4736ce2c04626f89f0cfedf345cad27ace3805b966d37fb24f3daa284fe36f9a5c7256af5f644211bfa8507d943f45f388e2af0b

  • SSDEEP

    12288:NhAcV6Y8w8h1/95Y9b+esq/4MhN/u5fbKVmfRJuhOKTjCUoPTZ7V:NucV6Y8wyUK5q/L3m5WmfvuOKTjCUOV5

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Plaston New PO 067476.exe

    • Size

      994KB

    • MD5

      d30bb9df615a8d1661f843d426ff40eb

    • SHA1

      4344e695b5f65917dc68f241ecde4b99cf25d930

    • SHA256

      b54ee7375e7ea979d16b76f183aaaccfa49681e2bd748ffca202fde9cf823346

    • SHA512

      44963c4b52eebb7c07d8cd9b2766faccc045dea166c76a479cdccbba06a9dc1a5b4be1003daed93b72f64f848497c3ae57be99501aa11d4569b30b7e7e26706c

    • SSDEEP

      24576:OeTLGMbsHwgKQuF/WaW+Bsfvuo+YZSU11q:ONHQqDt+BcGodZSf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks