General

  • Target

    SOA.vbs

  • Size

    379KB

  • Sample

    250330-w6n9zawpw9

  • MD5

    ce9650c94c571b5f52bfa309d6b3fc8d

  • SHA1

    52d7bc1dfb97e949aa9907bf6cd48fc05fc19ad1

  • SHA256

    f0b9b0709d906b96267804708a14f5f40b33518b558d8041776c9b62f3b36824

  • SHA512

    35fc9c81f23066736ba690529b78f98466ab2c03f290df75841b865c46a49a65f3a3837f3c64f838a2c3fb0da557d877fc4ae13290953f441871779d98ec9da1

  • SSDEEP

    1536:09MDsyDWF5fExMw/j3OBYXMecOXcggQkbN8tgSgftATlon4EFcXAwpEu+WCzW4GO:OM1WFypTOBYXMecOXcggQkbVx

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA.vbs

    • Size

      379KB

    • MD5

      ce9650c94c571b5f52bfa309d6b3fc8d

    • SHA1

      52d7bc1dfb97e949aa9907bf6cd48fc05fc19ad1

    • SHA256

      f0b9b0709d906b96267804708a14f5f40b33518b558d8041776c9b62f3b36824

    • SHA512

      35fc9c81f23066736ba690529b78f98466ab2c03f290df75841b865c46a49a65f3a3837f3c64f838a2c3fb0da557d877fc4ae13290953f441871779d98ec9da1

    • SSDEEP

      1536:09MDsyDWF5fExMw/j3OBYXMecOXcggQkbN8tgSgftATlon4EFcXAwpEu+WCzW4GO:OM1WFypTOBYXMecOXcggQkbVx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks