General

  • Target

    80f69949550d327ea8bdcde4e40af0f8240d218920068164196af1505a881be7

  • Size

    648KB

  • Sample

    241009-qnxwhazemc

  • MD5

    07c4444384ffe1f96f77e6c85b02b059

  • SHA1

    c359b51cf26f8862967b50977a168fb3cfff4d16

  • SHA256

    80f69949550d327ea8bdcde4e40af0f8240d218920068164196af1505a881be7

  • SHA512

    1cf733278794e8647d12a789ce68b2e7fb33c6fa3ec59872b241b4343c10108d8ed67441f7eefdad5389beef992711ce1a0b6773e89f8d63b8291606b2dfa868

  • SSDEEP

    12288:iCSnTK09UgAn4uLcqQbDY+kFn3+HHX7PuA9F6flQ4xTHh/jon:iC0v9TAn4uLHQw+kFn3+naA9FsHI

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA-Sep24.exe

    • Size

      811KB

    • MD5

      dec1aede826ff5b8ed6ae26778452996

    • SHA1

      da1cc5dec36cd44e8cdbdc01c52138776dd67a39

    • SHA256

      223b17b28b631da923ca472fc458645f286554be5032c7cf95ff6b8fce43b90e

    • SHA512

      e36126053604d7b09d38955601bf194153d862df7cfd43df0438397f586af60e321db19df2ceda4cd87713397abb330b34d78d86912e02e3d3527812a62a5031

    • SSDEEP

      12288:Qr4lwKEkWIIuVZ9dhnj+kLjpDpjaz1n4cvAj4FrqfabW/8nMYT4mE:WpKEkWKnBnj7+xvA4oaa/BcTE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks