General

  • Target

    4ad19f3b83382bd4874693be46fae7c3.bin

  • Size

    463KB

  • Sample

    230611-brpa7sha2s

  • MD5

    b56d28e27bef3238de8ec16a11210915

  • SHA1

    34b48893d84f29b4bcc9b904923aea6710551eed

  • SHA256

    b70a1407fc2f0a2eced541c4579404748c0c1a75570d9d773ffdbc73fe6a9bec

  • SHA512

    c9c4670b9770ec1ef1084aca53f7e1c81aab76eec9a76e16ba39b37eabe6fc4af8fe08dc19107201ce3072f47698ff96daed532b508a8f2608a3d881a39b6a8b

  • SSDEEP

    12288:SQU+f8uLfp58lI6CrQVstQmXEF1ytyJduE:vP0uTP82XQatitqE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Revised Proforma Invoice WSI116850PF.exe

    • Size

      884KB

    • MD5

      eac45e7940e2536662d67f5c2bb888f8

    • SHA1

      99accc50514d38dfd74883b10789a471f4cc2bca

    • SHA256

      3e1f623f0b2c1b85bcbca396bbeb79e06db39138a004c14201827ed1a8ca377a

    • SHA512

      9053620605e242827e03dc5632e55dfef2ad839a63f5ad2be0d6e0a0a750e46c20e6d944623518e68753838f1629fe72ef5a48f780d12fbc33afef348ce16fc3

    • SSDEEP

      12288:EW0lwFqIwr+i3Tp3OQwN5V2cKxZMXdKkDkB0c:RZFwTp3duL2xxGKoy0c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks