General

  • Target

    autorization Letter.zip

  • Size

    641KB

  • Sample

    240925-gpddtasald

  • MD5

    92b7f6de0dc314f73303669750f13ca1

  • SHA1

    12ef206c95b97fb1b73893373f29a0f175955f8c

  • SHA256

    20868c1653dfe702c2192bf09fd0aa2fa7424a341dcc89c4883260a0747c479f

  • SHA512

    e7870f246b84ae40aca132aee01750fb99d3ab2a8b0fe5d3f919a68130dc6504fd6792478b2cdb75d70f15511a49f7eb47ad6371b91eb6a51ed6c2761351d686

  • SSDEEP

    12288:b2LzjBvpxIOmQJo7oAdTQo9trulsyxOJDURPDyRBqzH728czTpiMQ5slv4uj7v5B:bglvpZlm7oAVRp3DUR4Bqv28Wygb5fJ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      autorization Letter.exe

    • Size

      821KB

    • MD5

      457f6cb01c6f3f7922ac201f70111ae5

    • SHA1

      934e5433fc83af812db461e3e7748c311e19b1bc

    • SHA256

      ca471400001374bddf5e6ff03db7889cf53bd516fe64209faee8b894b454c3c5

    • SHA512

      2403c0ab282e085b54ab5689fbae2328cf16d19bdec2edb24e32ad6bab79bdf2aba26aa52a48b44f9f573e390636a1401c7f7b30104eda131d4bec9776d06a9b

    • SSDEEP

      24576:4nIY7owVZppDU/4p2v213ZYip6rhrCWKjMA:4t7o6Zp9L2v2TYXrhrCWkMA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks