General

  • Target

    e3529859fea022c422f7b0d78ae1ddf0c6bde2a42f8c5f3358e3f795367c706c

  • Size

    659KB

  • Sample

    250122-bxv1ya1rcp

  • MD5

    547bcbc11bd1700a2f0e309b2218f12c

  • SHA1

    d477b2385ebd242c1af0db745563acb44f08e5d5

  • SHA256

    e3529859fea022c422f7b0d78ae1ddf0c6bde2a42f8c5f3358e3f795367c706c

  • SHA512

    7fd54b8612cf8494ddb13fde6adba2307aeb33468d86a21b0ce3fb193bc26a10d70531553c3c5b5a737f7b16054777da4959c61b039eae3a6883fc21248f6b2e

  • SSDEEP

    12288:IMA73wd6kHcyVR8uhMKB25HVx/2CRiSE4Eeyvcu8EjeQLXaZLp9LYMPd:IMAUrHcyVR8uFg/2CRSxLXyp95l

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA.exe

    • Size

      781KB

    • MD5

      4c92026fcad5536d428c973e4762c7ca

    • SHA1

      2821bd1121d2c2ccfd405838596f6961ca4ee3e9

    • SHA256

      d9a53c3e1a9e6447e32fc86fac2b5e76bf3a1e50af3c9f1bf4f6d25e0186840b

    • SHA512

      f98a501b10ffdc8ca54790c723aa63502c3a311e001e6d7b619332aaea99922e29b2227b76780c2631105a4068e4170e6494f01ff364b391e7ce51f630409b57

    • SSDEEP

      12288:CKOlbxr80IO8Df1iSR22mBnbuRno5Rq+wbGqKkpNdRhnoHLBhAGD02k8:H/f1p22Mb6nyRq+wbGqfNzhoHVj9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks