General

  • Target

    625a1f644a1bb670888b7c0c8686f04888b28a4784bcfd9406db9b8c6b01b6da

  • Size

    772KB

  • Sample

    241123-cg9d3avpev

  • MD5

    6ef7003fbdb6166d87cc0fcef2c1a87b

  • SHA1

    1a3547def5275db062ef135b073da48184af2b98

  • SHA256

    625a1f644a1bb670888b7c0c8686f04888b28a4784bcfd9406db9b8c6b01b6da

  • SHA512

    f583e81c76ae4b19d79fe7be783ac323f3b31b2c892c9e0033d8df3e2853079ba99ec35f03f4c0944c604429eb99e3565eb3bd1f58ce2e751119ed17c19c6267

  • SSDEEP

    12288:HF0VK4A9baHl/P6NdN20v/LzwRqRg8joKviPtqPZPP7sr:l0VKa56xHgYR/EYiPWPPg

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    marcellinus360

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      datasheet.exe

    • Size

      711KB

    • MD5

      b128f4fb83851afd96c7580f1fd69480

    • SHA1

      8e9115fb23a45c48ceb19f7b2894ddcb488535fd

    • SHA256

      c314d3fb3da26b9d6571bbefeba0fd0dd4aac29e26a4643932ea034e46fcf650

    • SHA512

      a6f155af1e48c9bd3c0e4c4debdac6c3b5ec528d7aab5a062daafc723d4904f80fa723e8df18b55269b7aca886d0b1f88c1d82d0d499cca287c6da813072feda

    • SSDEEP

      12288:qF0VK4A9baHl/P6NdN20v/LzwRqRg8joKviPtqPZPP7sr:g0VKa56xHgYR/EYiPWPPg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks