General

  • Target

    cb00bcbda04d9001fba05a6328307421c27b18ff9b34d7083ed431c1002ccb7c

  • Size

    58KB

  • Sample

    250423-ay52vswjz6

  • MD5

    21c5c759ad119c1b7c18f8b4a1e1c522

  • SHA1

    946668cc165142b968bb73009eb3a27f93626d21

  • SHA256

    cb00bcbda04d9001fba05a6328307421c27b18ff9b34d7083ed431c1002ccb7c

  • SHA512

    03a0a14c271960d0cde959f20e55f1d52d2438b0940e5916d34d51cc3927dc2988e856e21a51adf479ffb1b07a9f4017a8f346cc6644cc3dfde881e643eaad21

  • SSDEEP

    1536://kGAZTIqSWq6zONu+xIylEEvOxyyBLA8Jv3nLOp:cqWq6zONuV/EvOyyBLA2vXLOp

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Tiajin Haizhi PO 1509 ETA Sydney ASAP.com

    • Size

      117KB

    • MD5

      9ea6b17348de29490d2ddcd0fc0f9233

    • SHA1

      b5adf8fdd81c676b6e3a04d3aaba364af496dc26

    • SHA256

      d346f457f38f941258addcc492783f9ec111c7230bb74ed4a0bb8992bf0c61fd

    • SHA512

      af8100b14220834c14248b1f82f8be6d6506fb2ed74b9cf00e769c7f7663b64ad38d40bf17c7ad479022aae426005b1c641cfbf1d2fc2a7dba6bfd07b044ac5f

    • SSDEEP

      3072:SPCJ6uhiPIhZxE8uIMNHPPK6Gs1U+W0ZBUQnIrL:RTKHPPIYtZBd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks