General

  • Target

    01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4

  • Size

    747KB

  • Sample

    250124-bmjvxstqam

  • MD5

    02786bcac1e68f432a07866844b0fc16

  • SHA1

    74c1c6618d49793e70f0e6221aa844b221dd28bf

  • SHA256

    01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4

  • SHA512

    932c2ed9ca4848c954d6507811e3f0bc38661cac4d77d5daec42a1712a3f23f8a736a2f774f18b310eb40edf85d58e782e7864a5dd976c9e9124605a636aa48b

  • SSDEEP

    12288:nDFtN/ybfNTlLJpgxDchlzbMvs5s4tPh0RLZOi72F:nDdOjVpiEhX5s4C9a

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4

    • Size

      747KB

    • MD5

      02786bcac1e68f432a07866844b0fc16

    • SHA1

      74c1c6618d49793e70f0e6221aa844b221dd28bf

    • SHA256

      01623046d87fa76ea3f656370cd71a69c7f53dfa3d9bc8aa379ea12f43b6dde4

    • SHA512

      932c2ed9ca4848c954d6507811e3f0bc38661cac4d77d5daec42a1712a3f23f8a736a2f774f18b310eb40edf85d58e782e7864a5dd976c9e9124605a636aa48b

    • SSDEEP

      12288:nDFtN/ybfNTlLJpgxDchlzbMvs5s4tPh0RLZOi72F:nDdOjVpiEhX5s4C9a

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks