General

  • Target

    720b4ea73cbbf0d6cda0398747438500d108af0916e211065756337e13d45196.zip

  • Size

    673KB

  • Sample

    230805-z7rchaeg84

  • MD5

    27830ad3d2fc49da1b1a7f34e6c765e3

  • SHA1

    1cab656f2a0628f146b28d24188dd494165457ce

  • SHA256

    57c98c0ee6d320d692b8c40432bcd5ffce9e72fcf5b1f13662a14d897f48a002

  • SHA512

    8d467105966a0bfbc5cab580283b4d5398102956c468fb0abe8f9ad23a7f46d44e2d80618c9f8befbf5828d90d3705e59bdb779d408b898f61e2cfec892bb669

  • SSDEEP

    12288:IeKpOHuL0BkcfBPgemotFHAwS/825f23jdJJ7/V14HiY1w:GpeBfBzXA182g3jJ7U6

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      New Order PO 208472747_IT.exe

    • Size

      1.3MB

    • MD5

      c447c561925b77d52242def762ee394b

    • SHA1

      ed080f397aacf655e9beb0583646f019e069f91d

    • SHA256

      2bd44c7eb0536845a0fa4ec54eaf49c47120c154d5d29ff167c312adc94a60b2

    • SHA512

      fe2755a2157f2987231de96b4120f38af8849db21a9bf67fef253be63acfba29a39fae68ddb6a23781018d62cd89ac177dffc6faf7164499e64992571a07b575

    • SSDEEP

      24576:45TTngb0u1iILnraOqHz9Yen5f6CDruxp6/:+g+I3+pZ5SCDrCp6/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks