General

  • Target

    765a177f25379d9a1cc940cc8e30c05fa98635799ddc3ecd12f4b977eb9057d5.tar

  • Size

    739KB

  • Sample

    240913-btceesxbmd

  • MD5

    b9f0f32f6650d565d60aa514f3930396

  • SHA1

    038a3fa03d72e0af4b69e243b3641fd0dbe06d85

  • SHA256

    765a177f25379d9a1cc940cc8e30c05fa98635799ddc3ecd12f4b977eb9057d5

  • SHA512

    a7933316a9895b69d748bfb0f603bbc76ecec2a7c2e8aaf874823e0140ebef48da648273cf5a4bc75f542b0c78c44d542e77e87488e9c626e7081fa57bc05dee

  • SSDEEP

    12288:muCiYvsrIBuq55QDJQ+sb0nzEUZCbijw34RRUAmbYgeNpt7FvFHgZy:jCHUrhDQgGbqi4jObY7Npbv5gZ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Swift Copy - 2209128.scr

    • Size

      738KB

    • MD5

      7ee0dd1050cb0400d6723bab54e7e8a8

    • SHA1

      6850fd22a2e19488ec67c26a5d23f940bafda503

    • SHA256

      cc7ca4eb1a90642066ef9697165ceb0a12cb5b8498a198cbed5524cab5974e74

    • SHA512

      a207290b41e14f2585c6cde57065e6ea636b28772632b3f1e5c6928b30cfb1f8fe5c19f62e470e674261f11920beaca55c5d561e1c53bf9d1bc76ac319b09c81

    • SSDEEP

      12288:puCiYvsrIBuq55QDJQ+sb0nzEUZCbijw34RRUAmbYgeNpt7FvFHgZy:oCHUrhDQgGbqi4jObY7Npbv5gZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks