General

  • Target

    d0f96b0b6183e3187efd5bc7e3c301d486a4f5c04265d95198ce32f1537e3f72.unknown

  • Size

    659KB

  • Sample

    240925-c2bcrszekm

  • MD5

    6afb88566ca38e9dd868bda2422b435b

  • SHA1

    b5e0a33f0363115b24512350263d99eb8af775eb

  • SHA256

    d0f96b0b6183e3187efd5bc7e3c301d486a4f5c04265d95198ce32f1537e3f72

  • SHA512

    ec2aa3d98b26110974ab849196c23cade2acb96afc1f77394d3ac009e93f5ddfc5d11f857595e039f0caeb3db12212dab926e4672e8873a712438ede04934480

  • SSDEEP

    12288:jOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:jWsJrm2DO0TvqH42ZLuMj7GEXze3UI

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Payment Advice.scr

    • Size

      657KB

    • MD5

      05971e8521240cd588015e689baab4b7

    • SHA1

      1911d514d8e9d3310b2876ee591553250a31f44f

    • SHA256

      d71f85d32dd19dd5a0c5ad3b97c3eba3277a5966035970a2c9ea7dd8e23fafa3

    • SHA512

      01db290b831f6e60efaa8bfeb8bb0e1f1137c7843b29da34f024ee6e4f4b2f341ed4f8f2ed7c1a202a7a99781224bfca8bbaf7479ba23796707fc3d0d9994448

    • SSDEEP

      12288:pOjsJrm2DORelTAeZjqjhazCtH42QWkn5IxQMj7RYLgXeevG3j8bQb:pWsJrm2DO0TvqH42ZLuMj7GEXze3UI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks