General

  • Target

    SOA.js

  • Size

    1.3MB

  • Sample

    250330-xxb4qavvdz

  • MD5

    6222f959e753473ec5809e67974bcb9f

  • SHA1

    9776ff34a03561f2f627d5a1489976dcb99d2035

  • SHA256

    4a04c5a034f2982cd6c0bd9355ea1d1e53351ffd65946848d82ffd212eba286e

  • SHA512

    153384ecb430cae36e8f82c89c866276e63d10a00630740a0ccc1233ea21dee90314889989f978d4698e17f558c76b8bd3b4aa4c5c9eba9b7eaa969743f33037

  • SSDEEP

    768:CNcCHqhu570NcCHqhu57UNcCHqhu570NcCHqhu57UNcCHqhu570NcCHqhu57UNcW:iz

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA.js

    • Size

      1.3MB

    • MD5

      6222f959e753473ec5809e67974bcb9f

    • SHA1

      9776ff34a03561f2f627d5a1489976dcb99d2035

    • SHA256

      4a04c5a034f2982cd6c0bd9355ea1d1e53351ffd65946848d82ffd212eba286e

    • SHA512

      153384ecb430cae36e8f82c89c866276e63d10a00630740a0ccc1233ea21dee90314889989f978d4698e17f558c76b8bd3b4aa4c5c9eba9b7eaa969743f33037

    • SSDEEP

      768:CNcCHqhu570NcCHqhu57UNcCHqhu570NcCHqhu57UNcCHqhu570NcCHqhu57UNcW:iz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks