General

  • Target

    4bb2f623b8e05072ed01e7fd0e9a4e28.bin

  • Size

    1.6MB

  • Sample

    241117-blh71asjfq

  • MD5

    c5033340d401fddcb1fa3c4f75b4b78e

  • SHA1

    5c6f23ea6a553da0729b71019beabcb0ba33d3d6

  • SHA256

    8d23705a5d808402edeb91aedc87d7bd77ab30347e39df15d841728d843aec4d

  • SHA512

    81ad9aa1cc565fe4f23f2e240eb11597b7299d8211c7d2076b8e224beb76d227a4fdb898a1ffa7ade2540e90b1d46cf6ac351d552e239b600dd01a974a978aea

  • SSDEEP

    24576:LKsw5KXKOajm2yKGdbtryva36M3vbFJvMwC31NuVs2sB5BhfhkTFalY:LW5GKRHMbtrma36MfzMwxsv7JkF

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      929fbee164997ce91edddfa6eae72cad7afd11955480d2582bfdc964505ccea2.vbs

    • Size

      2.2MB

    • MD5

      4bb2f623b8e05072ed01e7fd0e9a4e28

    • SHA1

      b53851e2fb8d9da46d05c813da5612a04e72242f

    • SHA256

      929fbee164997ce91edddfa6eae72cad7afd11955480d2582bfdc964505ccea2

    • SHA512

      b2740378d3d52935e8b3e52a6c4c74928de678dbf449a08796e2467cef341b03fe755132b4aaf4fa4a63428854a42749584acf779efce4340ab9c22cfca1e607

    • SSDEEP

      49152:B20hVNq/RiQ4N+jRDSBTUxaWA/ZUgHYuhEBprt6:P+U

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks