General

  • Target

    f2328dd8020d35e6e05fbf24367c4c445b5ebd701b2a570ab3349d8013461f31

  • Size

    581KB

  • Sample

    241123-ffepvavmhn

  • MD5

    ab0bc139ac67b67ad7613e00ec64c105

  • SHA1

    77de9a7e98aa432b0b296bbcb16b0ffa61e39618

  • SHA256

    f2328dd8020d35e6e05fbf24367c4c445b5ebd701b2a570ab3349d8013461f31

  • SHA512

    146a6327557b6057beddf36f2ae33c223442f85380dff11b9269c14728e53276ba1aa10b21da688d52d564ec40b31d00c1ddddbad621ecf0558dee427aea2356

  • SSDEEP

    12288:DVtBtQMha6fvYwwPEr52DRsnEOFIPAyuV57qUqPgM72gyTM/c8Z8JwWc54U:z/xU6YLmLuPg7fqPgMy2/c8Z8tHU

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO] G_24370-24396_SI2_S25_8658.exe

    • Size

      2.3MB

    • MD5

      fd1db3d42f8ce22b75ee45b2b2e18075

    • SHA1

      532f70a54fb672faca5fd8fbf3df4b9e33de13c4

    • SHA256

      d5e518efcccc11bc6e29f1c5b89279ce4fdab95913ddab884306cc8ad0f8e7a3

    • SHA512

      1c5bb62f28060c78c633b587a4afeed1ac0c6faead422a94a52463f5a3fb366a5489f2529b829e8d2c2e90859890404be1204bd9a9b2db7c61f46bbfcfd94e7b

    • SSDEEP

      12288:EMha6lvswwPEr52DxsnECFePAYuH5vqUq/gM7aggZM/c8ZiJwmcYS+:FU62LmDwPQvfq/gMOo/c8ZiDHS+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks