General

  • Target

    23042025_0724_Demurrage Claim 20250422pdf.vbe.zip

  • Size

    310KB

  • Sample

    250423-h8s42s1tdy

  • MD5

    9a7038950a83721ab223f82cad279bf6

  • SHA1

    e1691f564e2b8267b2fb6e259dec9881f01cbb51

  • SHA256

    31ef12a408e8a43e5bdd79f116c81b31261032ebbc1c079edfb4a6f68938df41

  • SHA512

    9e3524dc1d9578695371325e2e2f295b46b46a99fed2f5f2da33f9e741fae9e03010e012fcf7fdbf2a2b38d1fe94e5dcfaa4c8644ec73f85e485041ff0c404bd

  • SSDEEP

    6144:clSDSrqQkcMR5ZuJay3VdOgrR28rN/AB4VqkjRXI8+wOeWqCQuSkF:clSDSLkcMR50Y1Y1rN/AtuiwruXF

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Demurrage Claim 20250422pdf.vbe

    • Size

      1.4MB

    • MD5

      3cad1f3c2c6f0a5652402adb31314137

    • SHA1

      cfa7f80e00c931b0107ae8b9d588fea375fa8486

    • SHA256

      bce73437ffc825f4af0e0a4a14b5d2f1a52c55d324be9ad415b2ed257274335e

    • SHA512

      96ed0e88756c77206d187059bd39fadeb597466940265c8a35b40ba60b30fce71427e84ebc32806d96046fd0f82c1215f334cff97d81c5f70ebc881d7162a005

    • SSDEEP

      24576:Sk6YLtW+5pCOOrwBfeom3RDRoM8cLIRk3tAaLMgs4GM4IVj:Tmf5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks