General

  • Target

    c01469ec1500b5bbb7ace40f1823b41e0965607d4fa54497f3dff82712c8070a.exe

  • Size

    815KB

  • Sample

    241220-haetrssjgw

  • MD5

    5d1d0f26ebb26738d78e964c0a57de2d

  • SHA1

    392ed434f12587a91368fb253f75fd6dffbf25ea

  • SHA256

    c01469ec1500b5bbb7ace40f1823b41e0965607d4fa54497f3dff82712c8070a

  • SHA512

    e3400ef8655c994754fd4e75c5a3ebbb91a4c53638d079e1616d80df0661ec3fb357cbdccdc51d5bdd1a9b4b8ae5466df6d7d70a3dc75831d353324a0bfe03ea

  • SSDEEP

    24576:XjlIhSPd+pl8v00qWGThl9oeg9adzlqmNd8kX:Xjl+SPspl8cVWGThl9MMdzl/Np

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      c01469ec1500b5bbb7ace40f1823b41e0965607d4fa54497f3dff82712c8070a.exe

    • Size

      815KB

    • MD5

      5d1d0f26ebb26738d78e964c0a57de2d

    • SHA1

      392ed434f12587a91368fb253f75fd6dffbf25ea

    • SHA256

      c01469ec1500b5bbb7ace40f1823b41e0965607d4fa54497f3dff82712c8070a

    • SHA512

      e3400ef8655c994754fd4e75c5a3ebbb91a4c53638d079e1616d80df0661ec3fb357cbdccdc51d5bdd1a9b4b8ae5466df6d7d70a3dc75831d353324a0bfe03ea

    • SSDEEP

      24576:XjlIhSPd+pl8v00qWGThl9oeg9adzlqmNd8kX:Xjl+SPspl8cVWGThl9MMdzl/Np

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks