General

  • Target

    shipping documents.r15.rar

  • Size

    666KB

  • Sample

    250116-p2yjhssjcn

  • MD5

    174fb30423bdf697d8da00e249223905

  • SHA1

    d0392600690e2cd907107efe926d82a02a3113ce

  • SHA256

    d6da864003f7e52db5c94d1381b7ac890f3dcfae1dfd2dc245e8a18a6590d29a

  • SHA512

    062856fc01c1c49d30f9829d27be876627d1b7fa9a50dcf1aa95ac746f841daf878be2221caa249aa3a3b58e105385ced62312ee80ae8354baf7c9ec1dad0a1e

  • SSDEEP

    12288:h/9ztVwxTFHtxVpoTdY27B2L8syMOwygjuqbnjWZaYiP0k4ifvpb+X720hw9veC:h/9fQTFHX8RZ24dLgjhbnjWyKaRb41KL

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      shipping documents.exe

    • Size

      779KB

    • MD5

      6bb964b13d7d40f9154178dcd5aef0b2

    • SHA1

      d8c1b8b31565af7457ba8e6deb0bd6cb5ed4c6db

    • SHA256

      7abd614a718eae6e0544e6828c834f275248093b5d807b7cc5c4de975dc7abc9

    • SHA512

      7afb160ab3792943c8521c5551d011f19bd9bbaa91f8151b1f4198050ab9179ce5a130c75692d8c43ca4afb9f02b0c2375af20e6638cf0879939478bb77134da

    • SSDEEP

      12288:a8XWXV7OeKYoX1hIlvJnvuejh2iUGxZ37v3BICEQXhGgqkN7HuK:wOeKYFSejhmOrRInOhGEx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks