General

  • Target

    PI-90349003421.xlsx

  • Size

    1.5MB

  • Sample

    241017-jfs41sxgpc

  • MD5

    9a809e0f1d435948eacdf1f0fb8b8316

  • SHA1

    aea62b0466c64967303de73085f16f40018cd44e

  • SHA256

    d52b8e527ad35f54de8e65b0d7c324a9c1afddcd0d09e4d20ea0cb7c8b327394

  • SHA512

    15630f6cf033f1c1fd43044c96ffe5b36593c56c9abc6d4b77d3c70b76c5ba73a1ecba679986b7e102c18b521067fc351e519102b8e74f4354babff0aac31697

  • SSDEEP

    24576:uVuRVKY8KpiARLlSRqqCfboz6Ga73J1Tkiv9jnQIesN7Vsj5j8m4beb9I:DRYipb0Rq5f06G8PVv9jnMsNOVomFW

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PI-90349003421.xlsx

    • Size

      1.5MB

    • MD5

      9a809e0f1d435948eacdf1f0fb8b8316

    • SHA1

      aea62b0466c64967303de73085f16f40018cd44e

    • SHA256

      d52b8e527ad35f54de8e65b0d7c324a9c1afddcd0d09e4d20ea0cb7c8b327394

    • SHA512

      15630f6cf033f1c1fd43044c96ffe5b36593c56c9abc6d4b77d3c70b76c5ba73a1ecba679986b7e102c18b521067fc351e519102b8e74f4354babff0aac31697

    • SSDEEP

      24576:uVuRVKY8KpiARLlSRqqCfboz6Ga73J1Tkiv9jnQIesN7Vsj5j8m4beb9I:DRYipb0Rq5f06G8PVv9jnMsNOVomFW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks