General

  • Target

    b9fdcdcc7221b4d0b59aed55f611ba2bd0d68fc4e882eeb479afaf4c6abbe717

  • Size

    24KB

  • Sample

    241017-bz3hssverg

  • MD5

    57a38ec7fd0987672546f26cd5182a14

  • SHA1

    44ea97d8f46a763572aa89d59306be3aa29c1b22

  • SHA256

    b9fdcdcc7221b4d0b59aed55f611ba2bd0d68fc4e882eeb479afaf4c6abbe717

  • SHA512

    2715e35768529206adee6416fba9ae11bd6c726f6e2189013d610373ebaf9cb153796ef15b7de59d6a539c97332958f39943354077181620e155153aa8c44fdc

  • SSDEEP

    192:eiJVpMIfAiyRfcUxNKwK04QKxL0LDZPAMulxMllh9kbLGmA5UQ7RHVpiqrgSVJNn:eiJQaQKxL+2uIngiq3tZW6kCfDcDSqDO

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      b9fdcdcc7221b4d0b59aed55f611ba2bd0d68fc4e882eeb479afaf4c6abbe717

    • Size

      24KB

    • MD5

      57a38ec7fd0987672546f26cd5182a14

    • SHA1

      44ea97d8f46a763572aa89d59306be3aa29c1b22

    • SHA256

      b9fdcdcc7221b4d0b59aed55f611ba2bd0d68fc4e882eeb479afaf4c6abbe717

    • SHA512

      2715e35768529206adee6416fba9ae11bd6c726f6e2189013d610373ebaf9cb153796ef15b7de59d6a539c97332958f39943354077181620e155153aa8c44fdc

    • SSDEEP

      192:eiJVpMIfAiyRfcUxNKwK04QKxL0LDZPAMulxMllh9kbLGmA5UQ7RHVpiqrgSVJNn:eiJQaQKxL+2uIngiq3tZW6kCfDcDSqDO

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks