General

  • Target

    AgentTesla.zip

  • Size

    2.0MB

  • Sample

    250121-ddr62ssnfn

  • MD5

    983f1503dc3e8c490843b7ccebc94707

  • SHA1

    b12f48268e5027ae1b144351e14f101c22e7131e

  • SHA256

    805d396aaac465a07010d9035a4f6cae6cd911e2f6b7e9ab9586ddb8d60bceca

  • SHA512

    734873f4f5bfe16e47ba5b2a79b99c7db92dba986da214dbc77a5588e31dfc4c485e7e15d4d19e56679012d13d7a34dc4be829ab6e0b8c12f7ad292ecc6cd94d

  • SSDEEP

    49152:azP2DsPCSVN8mO8grMUPTOqxxhX/uifdFv:azPLViNlMUiYxhX/DL

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      shipping documents.exe

    • Size

      779KB

    • MD5

      6bb964b13d7d40f9154178dcd5aef0b2

    • SHA1

      d8c1b8b31565af7457ba8e6deb0bd6cb5ed4c6db

    • SHA256

      7abd614a718eae6e0544e6828c834f275248093b5d807b7cc5c4de975dc7abc9

    • SHA512

      7afb160ab3792943c8521c5551d011f19bd9bbaa91f8151b1f4198050ab9179ce5a130c75692d8c43ca4afb9f02b0c2375af20e6638cf0879939478bb77134da

    • SSDEEP

      12288:a8XWXV7OeKYoX1hIlvJnvuejh2iUGxZ37v3BICEQXhGgqkN7HuK:wOeKYFSejhmOrRInOhGEx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      shipping documents.exe

    • Size

      779KB

    • MD5

      6bb964b13d7d40f9154178dcd5aef0b2

    • SHA1

      d8c1b8b31565af7457ba8e6deb0bd6cb5ed4c6db

    • SHA256

      7abd614a718eae6e0544e6828c834f275248093b5d807b7cc5c4de975dc7abc9

    • SHA512

      7afb160ab3792943c8521c5551d011f19bd9bbaa91f8151b1f4198050ab9179ce5a130c75692d8c43ca4afb9f02b0c2375af20e6638cf0879939478bb77134da

    • SSDEEP

      12288:a8XWXV7OeKYoX1hIlvJnvuejh2iUGxZ37v3BICEQXhGgqkN7HuK:wOeKYFSejhmOrRInOhGEx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      AgentTesla/d6da864003f7e52db5c94d1381b7ac890f3dcfae1dfd2dc245e8a18a6590d29a/d6da864003f7e52db5c94d1381b7ac890f3dcfae1dfd2dc245e8a18a6590d29a/shipping documents.exe

    • Size

      779KB

    • MD5

      6bb964b13d7d40f9154178dcd5aef0b2

    • SHA1

      d8c1b8b31565af7457ba8e6deb0bd6cb5ed4c6db

    • SHA256

      7abd614a718eae6e0544e6828c834f275248093b5d807b7cc5c4de975dc7abc9

    • SHA512

      7afb160ab3792943c8521c5551d011f19bd9bbaa91f8151b1f4198050ab9179ce5a130c75692d8c43ca4afb9f02b0c2375af20e6638cf0879939478bb77134da

    • SSDEEP

      12288:a8XWXV7OeKYoX1hIlvJnvuejh2iUGxZ37v3BICEQXhGgqkN7HuK:wOeKYFSejhmOrRInOhGEx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks