General

  • Target

    autorization Letter.exe

  • Size

    821KB

  • Sample

    240926-fn5agaygjl

  • MD5

    457f6cb01c6f3f7922ac201f70111ae5

  • SHA1

    934e5433fc83af812db461e3e7748c311e19b1bc

  • SHA256

    ca471400001374bddf5e6ff03db7889cf53bd516fe64209faee8b894b454c3c5

  • SHA512

    2403c0ab282e085b54ab5689fbae2328cf16d19bdec2edb24e32ad6bab79bdf2aba26aa52a48b44f9f573e390636a1401c7f7b30104eda131d4bec9776d06a9b

  • SSDEEP

    24576:4nIY7owVZppDU/4p2v213ZYip6rhrCWKjMA:4t7o6Zp9L2v2TYXrhrCWkMA

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      autorization Letter.exe

    • Size

      821KB

    • MD5

      457f6cb01c6f3f7922ac201f70111ae5

    • SHA1

      934e5433fc83af812db461e3e7748c311e19b1bc

    • SHA256

      ca471400001374bddf5e6ff03db7889cf53bd516fe64209faee8b894b454c3c5

    • SHA512

      2403c0ab282e085b54ab5689fbae2328cf16d19bdec2edb24e32ad6bab79bdf2aba26aa52a48b44f9f573e390636a1401c7f7b30104eda131d4bec9776d06a9b

    • SSDEEP

      24576:4nIY7owVZppDU/4p2v213ZYip6rhrCWKjMA:4t7o6Zp9L2v2TYXrhrCWkMA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks