General

  • Target

    fc3a02467e56a002d3749c1a51a40247dfbfdf2e4528f3ffb807bfc5460350ec

  • Size

    766KB

  • Sample

    241123-cffqcsvpa1

  • MD5

    f4d6612a6b5cb4631d20b408045d4225

  • SHA1

    fd6f304e36c91db96529a45441d54f49f51861ae

  • SHA256

    fc3a02467e56a002d3749c1a51a40247dfbfdf2e4528f3ffb807bfc5460350ec

  • SHA512

    8ecb7eaab7ab64e8c6df825b091fb854720941037eed082e7f604562dedf0e10a10d8d89c1ee52fa2c5013403df16ae085c6b64559cd22a1b368cd1a965e708b

  • SSDEEP

    12288:4OMK4A9bEyD9Qw5+Wg+aFqF8F7sqtzm17+Qx6KOd0zwtI9p6bNjEW:TMKEyZtQN4yTzo7+u6da79YdE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      DATASHEET.pdf.exe

    • Size

      706KB

    • MD5

      fe363e3c97ba9206b611873fb91a0793

    • SHA1

      f8559afa8d8ae545327484693a8b11fee4cb6142

    • SHA256

      7f72c9f1ea3533cb8ae08c3bb3da362cb2b97eff3b6b30ad3c05f74fffbe2071

    • SHA512

      35ea1b34f82aff941e6b968642c81bab49aeecefce9b28728f67b2ebf1853ac73dced4b8b17f01610477964081ea4ac5967df7d9237618753fa3dded41d785a4

    • SSDEEP

      12288:BOMK4A9bEyD9Qw5+Wg+aFqF8F7sqtzm17+Qx6KOd0zwtI9p6bNjEW:kMKEyZtQN4yTzo7+u6da79YdE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks