General

  • Target

    94e14d64d9d1242ef09ce0ad641426ad5f93d71a9e2587d91e2302cc296a4f93

  • Size

    671KB

  • Sample

    250122-bpx6bs1nfl

  • MD5

    c8b0a53a4bd555518e5b37801be8ff06

  • SHA1

    5fbc2aabb96994c97b5b35800514a57dde49764c

  • SHA256

    94e14d64d9d1242ef09ce0ad641426ad5f93d71a9e2587d91e2302cc296a4f93

  • SHA512

    1636c9061eb51da5654f8922b83df44f146c0745ef69119d87ef5d8227aa1638c837c88849929141cf9ab024a83cb873eda085e0044e242bef17d262e94ce4d7

  • SSDEEP

    12288:02u8OOJobKjbCTe2gZciEOxuqIgKatWkGPn0lJyzOEcudN2Z04wBkZqTKQd2LX:W9KHCTefx0gNtWkjlJyrdnFUed2j

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO#98540-00.exe

    • Size

      818KB

    • MD5

      ea046995fae362aca9e45a8374b2e7d3

    • SHA1

      220030086ea9c40d840904ee914fce760355313a

    • SHA256

      887f393b62c6c4b69e81cfc772397619082d936dd38cbcbc0f54b623ef871af6

    • SHA512

      fc5fc4d4ba627d5503bf162c7ea0b86379be979badf27950449ee7ae6552b14ad7b170a567feaca8b6a1c98c404e399651d1fec7e4d0330161ec436b940c5deb

    • SSDEEP

      12288:LOfIO8DfgZCZtoym2Tm9I+M4AszKlF5+YZ4sEu9neODY72eM9lOR7rCThUa+e1+:LOkfpOFM4TKQyxetMCRvE+p

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks