General

  • Target

    d6e45de8ca76e1b129c6d45fb36a6880783c7b25702068bc5c1e288159074dca

  • Size

    627KB

  • Sample

    250123-jk2lys1lem

  • MD5

    702399490db1e6070f6fede58aec0576

  • SHA1

    6237221953b0a8df36ea05b94ac7557eba842a64

  • SHA256

    d6e45de8ca76e1b129c6d45fb36a6880783c7b25702068bc5c1e288159074dca

  • SHA512

    50e46d0c88bc73f785fcb50f46f0e31bcf7fe89e19e0182659f285ea11275a25b13e56594d2738601f6b95b7f1b8026020b0e94350f285761f74a0b449f700d6

  • SSDEEP

    12288:InNaNpGu+QHAzNYrw0sccavkT5kVQlN/w9T1NButZLKcQiSR:GNewQHAzNYr2cfvkbf/w1NAtZLfQFR

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      enquiry.exe

    • Size

      747KB

    • MD5

      46dfa461d0a4845e2ea053c41521b993

    • SHA1

      f133351018473754a29114ef545d20ce595bdda4

    • SHA256

      6d6cb640f6e698a0f25989871716904f7780f4c26cfaf9a824f7fc4feb594f89

    • SHA512

      21f7f4d85e6b8bd811cdfddf6aced9558b087cadbcaa691d0eb95b6259d0f90c854b7bb88bbc04fa5491c1509b1deea17c90984f7e710bcfbbf9dd5bb0b171cc

    • SSDEEP

      12288:k5Ftiw25MuGyAnufZwNvs/4TToRdPCwh0AtkAk9x02whNbx:kxlQVAnuf2NxTipCTAkHwh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks