General

  • Target

    invoice.r15

  • Size

    643KB

  • Sample

    250124-s4qs8sxjhr

  • MD5

    edef7d9492184ae7595b1df994da929c

  • SHA1

    09bb4da7038b2e52c5160588af803af0328f5086

  • SHA256

    7b39be84d49d7f1c986d881c8c69cfc63e111c983d55106106959c6c1a83667a

  • SHA512

    1311c0054a8a327968f535c7ef6feb737411ba72f04da50138a077feeca6e6fc698c48e9084b9bff58c50b2694b6cbc07faaa9f52f839f10a519e99de7c8be1e

  • SSDEEP

    12288:veHwv28jrXWYg7mKjglMxhB7SYELfj5kQO3RTVZaw+gPUPcq:vYO283FCjIoRSZ+QOTHaZc0B

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      invoice.exe

    • Size

      744KB

    • MD5

      b0ebd9e6b7db75c09086f8917c7c6fbb

    • SHA1

      7c4f8ce260d37433d15b972e90b8a2f112b8a316

    • SHA256

      6626d5216b21933a5ccca366777e3fa81f6ab20fc642e39713698db5d28792ae

    • SHA512

      3581a18d6f94c76982de58a27b238b4463d1cb7524ba0c121daceb6b607c3bf490b4bd5d6cc47b95d19be6ce6e9dd8eb7ab5e5d918e4703b49d0f9f76331e85d

    • SSDEEP

      12288:oCyu7+JALQsACpMfRsBpdht5EEiT2e2UbeKkEyVTAa+jXUF5C3WUy482jmTMsoBM:m/JAQsLkRCnt5ZdayVTJ+jUFMdmTkM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks