General

  • Target

    c4818f6a9908f61464ed5c1187f893a8b0a782683db27d0c15f9da93c872bbff.7z

  • Size

    706KB

  • Sample

    241212-c7c4jsxpg1

  • MD5

    32242204396fc8f3e2b6a6731533b72b

  • SHA1

    99b4ef4b99c7832d68a29b2e0b1bfa03923db347

  • SHA256

    c4818f6a9908f61464ed5c1187f893a8b0a782683db27d0c15f9da93c872bbff

  • SHA512

    e86cc6c35022ec6de24cde65765e57484255dc3422955a561603200cb857ae03803c0beebb901a68b187ab3bdd0499a5878bbcaa4cf68ff0fbbc1e5875cedba8

  • SSDEEP

    12288:jHEyDHlVy5+64OS0MRnlSq1SXn0JmHT2C45kMX1iZoVe0OJE:5l1uMRxoXn00HfskMXcZHvJE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      INV01542 , INV01562-7500003124 JTR-0084.bat

    • Size

      820KB

    • MD5

      0b87c44a55bc24c1a96e1797c939bb10

    • SHA1

      af91b2b662f7a1827fba6bf5158178dd8cebcbd7

    • SHA256

      bb1cbd0fd591bed430c586933cced40166d459cfd324c738e5d3d6cd8e154a36

    • SHA512

      e5938abe43807c803726c20a21c4c970e03f3caca72b370288b428aaa8a553b3f219039386819eb9df662ed4b02a8a11a12ef2e3e6d5cba1a5e413d14fc8948f

    • SSDEEP

      12288:EoMKhM39TXsTAiM6kVRl+64Oh0dRnlRq1SXx0JmHT2p45kM61iBoVm:tMacicY5dReoXx00HqskM6cBt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks