General

  • Target

    18092024_0728_17092024_Ref Cheque 705059.zip

  • Size

    4KB

  • Sample

    240918-jasajaygrb

  • MD5

    0eed690a8e296ed00842e968b71014c5

  • SHA1

    dbf35c0555cb8eb6e4192fd1a78fd4b064ca8b4c

  • SHA256

    eddebeaf37033efffcbecd52bcf529a006fc0cebbe3f347a83cec7854e7df4d0

  • SHA512

    7f31fc9a1503ea052b6ab42de93d5eed47973003e597beb41a986d72cdbe7c5e0a33a17e2443bdb1ed76ad9cf3e712aa0704a7df8b2c19e9b196ac099d9bc1e2

  • SSDEEP

    96:MVk9JzZsZGXlRgci+Ks5HWjT7oHkhiewhb4ZX9Hfrfk65ZfVg:MVk9RZsZG4sxW37HhizhEHHw679g

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Ref Cheque 705059.vbe

    • Size

      10KB

    • MD5

      90d3ad68895627841ba7ac18079fc0b1

    • SHA1

      a00920b635b500f67983ab4bed25a38df9bd5549

    • SHA256

      ca4d0af48b50bd06f172eee41fb979e2d73defb5c51fd358bc6b36de4cab7369

    • SHA512

      8e3d459a1d11cadfc336c364918c97ecf0004418afb890bd3b36e9139d30bfe956266f2e87e29e2e5df46b01e94c1bc64b9964b3a556ad64f6a5b2a8afb493b6

    • SSDEEP

      192:xXNM3lLrcABBqcDsPdSuXZlzrZ7gmUWoZl5FYleLMl/1uw5YOAxJhHFK:xNElLAAKjBLf1UWobElwMl/mHHs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks