General

  • Target

    0b87c44a55bc24c1a96e1797c939bb10.bin

  • Size

    720KB

  • Sample

    241213-bc51eatkhs

  • MD5

    941f166a4b6b3f5824d59a5eda3ba2d5

  • SHA1

    2363c78d15036278323651a1b58a7caa519ad70f

  • SHA256

    a2f855a7ea95aaefe612806001db58f149906ff4fea40a25f82f75b089a3436e

  • SHA512

    5ffdc9f238b7d1874fb06bb61a550e4d4e14959ba836bc0c7c539bc1b9ff49b5b46981131c194524c89459db100b67b45dc2b3f34ab02c91bb42632dba4a1645

  • SSDEEP

    12288:jbvl1qWyWLPSilxowmnpEhjlf3MYHvBIu2c+R6mkz1UU1vFNzr0Dp/KqU6RjDau:jbt1qWrPLUp0f3HpIuJAGv1dNyRK3u

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      bb1cbd0fd591bed430c586933cced40166d459cfd324c738e5d3d6cd8e154a36.exe

    • Size

      820KB

    • MD5

      0b87c44a55bc24c1a96e1797c939bb10

    • SHA1

      af91b2b662f7a1827fba6bf5158178dd8cebcbd7

    • SHA256

      bb1cbd0fd591bed430c586933cced40166d459cfd324c738e5d3d6cd8e154a36

    • SHA512

      e5938abe43807c803726c20a21c4c970e03f3caca72b370288b428aaa8a553b3f219039386819eb9df662ed4b02a8a11a12ef2e3e6d5cba1a5e413d14fc8948f

    • SSDEEP

      12288:EoMKhM39TXsTAiM6kVRl+64Oh0dRnlRq1SXx0JmHT2p45kM61iBoVm:tMacicY5dReoXx00HqskM6cBt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks