General

  • Target

    5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd

  • Size

    761KB

  • Sample

    230308-pd1nzaff8z

  • MD5

    11ecf3ab5737650035ef7e9a3c57f80a

  • SHA1

    31b6aef080ee864059e8a82d8d9d2b3745578f2d

  • SHA256

    5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd

  • SHA512

    bc14a771bfe31ad55a29aed0f672da9805dee55f8ede8af7518980cdc244ee0c2873eb8b99b751d3c981063fafe9dcecd3b3ccbf257be6be9b199fa395cbbd1c

  • SSDEEP

    12288:2dj50i653yhXyiQmHE1ODGK90f8EcgeL5KDmCxkFTmcj+f8p5:e50iE3yhXyiHE1ONe5eFKDmrFTzj+U

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1077566111689740349/gnJjTpoCwEM3PNDQkU1Kb4C12Er7lUmsBkWDapkU4UnedFpWqrRphmnNJUx4027RyZXM

Targets

    • Target

      5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd

    • Size

      761KB

    • MD5

      11ecf3ab5737650035ef7e9a3c57f80a

    • SHA1

      31b6aef080ee864059e8a82d8d9d2b3745578f2d

    • SHA256

      5c3a2912958bff3bd0d25b141a32717f0f7c4c7b1091a263185694c2f779f3cd

    • SHA512

      bc14a771bfe31ad55a29aed0f672da9805dee55f8ede8af7518980cdc244ee0c2873eb8b99b751d3c981063fafe9dcecd3b3ccbf257be6be9b199fa395cbbd1c

    • SSDEEP

      12288:2dj50i653yhXyiQmHE1ODGK90f8EcgeL5KDmCxkFTmcj+f8p5:e50iE3yhXyiHE1ONe5eFKDmrFTzj+U

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks