General

  • Target

    29112024_0556_28112024_DATASHEET.pdf.iso

  • Size

    874KB

  • Sample

    241129-gm684svmbk

  • MD5

    e594513187cd25454fc8794982bf44fc

  • SHA1

    f2d3c036ef5219a052262b6b83252eb1bcc46080

  • SHA256

    4b03d49072fda90224ebe6dda7c4e1f56c1b03385663f37d69fcb517ea260aea

  • SHA512

    f128a84c317da0916ea9a2935023b85117660c568b78ba280ec69b199fd67eb9cd7cb07775e7c134f5e5bf2119cfd97b4a732d8d3a1814de67d26ce4abe66dd6

  • SSDEEP

    24576:wl1zGUxjsHnpd/nLkB0c0NmrjZU/+LKypMJJd:wPLiz/LFd0UmLdpMJJ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      DATASHEET.pdf.exe

    • Size

      812KB

    • MD5

      ca87fec7058336ee181a72b358fe73eb

    • SHA1

      b60594db58b85f139fe81c09e66157f4589143e0

    • SHA256

      42c1b181d44bcf77ae24d90ded8dc3a319a1646e5d7e93fc6cfc4d25ae685f83

    • SHA512

      b4c2cf61cfea57fccacaa540d070f8cd62e61b66380615fd8ffebbea92fa03f94f09a0ddb7f58f8e821c08b2416726d8df005445324498a35461168b5f51bd55

    • SSDEEP

      24576:tl1zGUxjsHnpd/nLkB0c0NmrjZU/+LKypMJJd:tPLiz/LFd0UmLdpMJJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks