General

  • Target

    b15aad2014d1cb42dac3e6ea1d23c762

  • Size

    2.5MB

  • Sample

    230208-cnyadagg56

  • MD5

    b15aad2014d1cb42dac3e6ea1d23c762

  • SHA1

    f325f393ee98d07c1e5c6f8a115688a42d625d25

  • SHA256

    80be6b0bd20ef1011f59c3f056e9558fb521c7a70e3e663365745677b5dc455c

  • SHA512

    bbb6b3430739c4ef8b16df40216a68ecfc8ddef8b9b7e64459e60908252ea702dc512aa3f8ea4ce86aee591fded0d793dcd728e38e2b015a2e7c68365fcf3327

  • SSDEEP

    6144:HmQ3XOJcw+BZ/f91QMUnrxUgtiA6LnjZRBLp7UC9eB+vYW4gN3szIIhIdm:GQ3mcBDHSadtpqB+gzGwgU

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      b15aad2014d1cb42dac3e6ea1d23c762

    • Size

      2.5MB

    • MD5

      b15aad2014d1cb42dac3e6ea1d23c762

    • SHA1

      f325f393ee98d07c1e5c6f8a115688a42d625d25

    • SHA256

      80be6b0bd20ef1011f59c3f056e9558fb521c7a70e3e663365745677b5dc455c

    • SHA512

      bbb6b3430739c4ef8b16df40216a68ecfc8ddef8b9b7e64459e60908252ea702dc512aa3f8ea4ce86aee591fded0d793dcd728e38e2b015a2e7c68365fcf3327

    • SSDEEP

      6144:HmQ3XOJcw+BZ/f91QMUnrxUgtiA6LnjZRBLp7UC9eB+vYW4gN3szIIhIdm:GQ3mcBDHSadtpqB+gzGwgU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks