General

  • Target

    993d354db3ef1303e379bc5932da451dfb9b0c5f01214d9d99aa2e354cc9801a

  • Size

    968KB

  • Sample

    240923-dyd5xsveqd

  • MD5

    6ea3b48c0d21916632dc10da884c8748

  • SHA1

    e42e4b252953c26221ea86e606460c4a57a215bc

  • SHA256

    993d354db3ef1303e379bc5932da451dfb9b0c5f01214d9d99aa2e354cc9801a

  • SHA512

    f1cc22c5c9b47a82bb542ac14bfc63f6a95dcf97335b45957f5338eeefea3196c58ed19142c74b449c69e8c1edbc34cd09226400b97065e6cf020470ea6f14db

  • SSDEEP

    24576:6XH697MtlMp1xNE/OlTLuCvqM3aNLBXr2aXg8Oh:KHPtgE/OZCCC86LpC6g8Oh

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      993d354db3ef1303e379bc5932da451dfb9b0c5f01214d9d99aa2e354cc9801a

    • Size

      968KB

    • MD5

      6ea3b48c0d21916632dc10da884c8748

    • SHA1

      e42e4b252953c26221ea86e606460c4a57a215bc

    • SHA256

      993d354db3ef1303e379bc5932da451dfb9b0c5f01214d9d99aa2e354cc9801a

    • SHA512

      f1cc22c5c9b47a82bb542ac14bfc63f6a95dcf97335b45957f5338eeefea3196c58ed19142c74b449c69e8c1edbc34cd09226400b97065e6cf020470ea6f14db

    • SSDEEP

      24576:6XH697MtlMp1xNE/OlTLuCvqM3aNLBXr2aXg8Oh:KHPtgE/OZCCC86LpC6g8Oh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks