General

  • Target

    UrgentRequest.exe.bin

  • Size

    489KB

  • Sample

    230505-ztl6maee94

  • MD5

    ad3aacf6f8e0905d67f88ba2c31f69d7

  • SHA1

    3a867a2b0e24f98281ed5138866adb0b9bcdaac1

  • SHA256

    f77c28f545a934ce820d6f8825455540e032bb0bc19d81100dc5c6ea4a349114

  • SHA512

    812626af14eed4fa2951957b103f88f61a35f75d4a99f19beb13b97828a2c1af43520b51060fd778236723470c8a9db618f22dba73dfdfca618e86c3395909bf

  • SSDEEP

    12288:IQ/ZfsqjIxTvEOVz329xVUoLSYuZEmaOh:T3IVEm729P3LSYYqOh

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      UrgentRequest.exe.bin

    • Size

      489KB

    • MD5

      ad3aacf6f8e0905d67f88ba2c31f69d7

    • SHA1

      3a867a2b0e24f98281ed5138866adb0b9bcdaac1

    • SHA256

      f77c28f545a934ce820d6f8825455540e032bb0bc19d81100dc5c6ea4a349114

    • SHA512

      812626af14eed4fa2951957b103f88f61a35f75d4a99f19beb13b97828a2c1af43520b51060fd778236723470c8a9db618f22dba73dfdfca618e86c3395909bf

    • SSDEEP

      12288:IQ/ZfsqjIxTvEOVz329xVUoLSYuZEmaOh:T3IVEm729P3LSYYqOh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks