General

  • Target

    Ningbo - Past Due Invoices.7z.001.7z

  • Size

    594KB

  • Sample

    240924-sb6nzstbqf

  • MD5

    5f9eef815d1c7e0eddab42e0b8947399

  • SHA1

    b4215b4db06737403c8f0071cbf80bc5b79bf6f6

  • SHA256

    95fe9b80f0a241ea6c42d44234fd50951873d683c96bdab50c41d3e4f3452b6c

  • SHA512

    c42759dc26df5cf8add0cab8bebae9893718825b7a4870710d19709b4bc6d24c030fee0370730bcb3a6d3a95a9c2342ed5536ad4587b6c4282a6683378133b72

  • SSDEEP

    12288:VDyX0Y1O52DCRelYAeZjqjkazCtH2SQWkE5IxtMb7RYLgXEevG3UPt1tJU9k:BOy2DC0YwqH2SZWjMb7GEXRe3Id

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Ningbo - Past Due Invoices.scr

    • Size

      657KB

    • MD5

      05971e8521240cd588015e689baab4b7

    • SHA1

      1911d514d8e9d3310b2876ee591553250a31f44f

    • SHA256

      d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3

    • SHA512

      01db290b831f6e60efaa8bfeb8bb0e1f1137c7843b29da34f024ee6e4f4b2f341ed4f8f2ed7c1a202a7a99781224bfca8bbaf7479ba23796707fc3d0d9994448

    • SSDEEP

      12288:pOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:pWsJrm2DO0TvqH42ZLuMj7GEXze3UI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks