General

  • Target

    980bdbac9ae7d494daaf5e30e.exe

  • Size

    864KB

  • Sample

    230709-ndsspade3v

  • MD5

    a9aae7866cef9615e98f3bdc0108f9d5

  • SHA1

    2677f5ada5cf82c1c671690e7203f447a5f8fce6

  • SHA256

    980bdbac9ae7d494daaf5e30e23656e81fbff319223f766d8c4ae65412d4d03b

  • SHA512

    dddcbfec3e14066e7497078d0c42e5388c6cdbb3a20b1e307436aa6c218217e4800727abb9bdaf3e6e58c276b324f80dbb432e95bac0bad44caa5509ddafd892

  • SSDEEP

    12288:vMLw3Zhl9gpUUre0FLP/cnwXwbqxqUya/qf4h5N0mX/xS:ECz6u8x/bpxqUya/tlX

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      980bdbac9ae7d494daaf5e30e.exe

    • Size

      864KB

    • MD5

      a9aae7866cef9615e98f3bdc0108f9d5

    • SHA1

      2677f5ada5cf82c1c671690e7203f447a5f8fce6

    • SHA256

      980bdbac9ae7d494daaf5e30e23656e81fbff319223f766d8c4ae65412d4d03b

    • SHA512

      dddcbfec3e14066e7497078d0c42e5388c6cdbb3a20b1e307436aa6c218217e4800727abb9bdaf3e6e58c276b324f80dbb432e95bac0bad44caa5509ddafd892

    • SSDEEP

      12288:vMLw3Zhl9gpUUre0FLP/cnwXwbqxqUya/qf4h5N0mX/xS:ECz6u8x/bpxqUya/tlX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks