General

  • Target

    487a65a744364c95696bf450fe78819afac41980fb6a106231f84aa0835aa5f2.exe

  • Size

    701KB

  • Sample

    250123-d4f7ga1nan

  • MD5

    fe46e2fc578c6f8788cba694e64c71fa

  • SHA1

    5962ff7fb535fd8435dc4bf4f1abe1a70e731801

  • SHA256

    487a65a744364c95696bf450fe78819afac41980fb6a106231f84aa0835aa5f2

  • SHA512

    0392998bfc22b0c62e64de62d5ead1f5ae2d3e40b050ea2c44ce0bcd98eabe3d7044d99c63473ede5b595fa0f2df189a603430c4dc40a844789e3ba8590111de

  • SSDEEP

    12288:ePWa+Axv0f/nkXFwy0X+LtYKnrX0gw4ta6iGqHw1UwnRWlo/SX3sh+35JkH:jA8kXUX8Xr0gwgZRwGSnsukH

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      487a65a744364c95696bf450fe78819afac41980fb6a106231f84aa0835aa5f2.exe

    • Size

      701KB

    • MD5

      fe46e2fc578c6f8788cba694e64c71fa

    • SHA1

      5962ff7fb535fd8435dc4bf4f1abe1a70e731801

    • SHA256

      487a65a744364c95696bf450fe78819afac41980fb6a106231f84aa0835aa5f2

    • SHA512

      0392998bfc22b0c62e64de62d5ead1f5ae2d3e40b050ea2c44ce0bcd98eabe3d7044d99c63473ede5b595fa0f2df189a603430c4dc40a844789e3ba8590111de

    • SSDEEP

      12288:ePWa+Axv0f/nkXFwy0X+LtYKnrX0gw4ta6iGqHw1UwnRWlo/SX3sh+35JkH:jA8kXUX8Xr0gwgZRwGSnsukH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks