General

  • Target

    SOA.exe

  • Size

    64KB

  • Sample

    230206-r228tahf71

  • MD5

    6b898494394893a2865fddd004227333

  • SHA1

    d011fb9000e60a21742590cc48677c971b9b01ae

  • SHA256

    b9f48f05b6f1651f58be0210fb474c75cdd8ed3ea88d013b5d0f755681d13934

  • SHA512

    b7be3a0bdaf29ae11d7fec9453b15bcb67e991a476e0b87b6069198a123247b5083a899369259a098b055693e6367c5c3907a7943b02e83f4f4a05f482f030ab

  • SSDEEP

    768:oAOYj9wjNWnBlJf4q90ekJ640LO6dusn04el:VOG9wjNmB/fN90N640ymuL3l

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA.exe

    • Size

      64KB

    • MD5

      6b898494394893a2865fddd004227333

    • SHA1

      d011fb9000e60a21742590cc48677c971b9b01ae

    • SHA256

      b9f48f05b6f1651f58be0210fb474c75cdd8ed3ea88d013b5d0f755681d13934

    • SHA512

      b7be3a0bdaf29ae11d7fec9453b15bcb67e991a476e0b87b6069198a123247b5083a899369259a098b055693e6367c5c3907a7943b02e83f4f4a05f482f030ab

    • SSDEEP

      768:oAOYj9wjNWnBlJf4q90ekJ640LO6dusn04el:VOG9wjNmB/fN90N640ymuL3l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks