General

  • Target

    ff1d598bd62f40bbe2dea0737be2fef7319fb655261b7323d362f2ffc30ae62b7z_JC.7z

  • Size

    469KB

  • Sample

    230815-wkgyrseg4x

  • MD5

    a16d427569f078b3124aea10c7469b17

  • SHA1

    2f041c08c0e028590e88a403b04e495f829e8705

  • SHA256

    ff1d598bd62f40bbe2dea0737be2fef7319fb655261b7323d362f2ffc30ae62b

  • SHA512

    53c131bed3d2b3e5397a2d3de55b6248a860e58c3d339c9a14e36d2e04bf35b186bd2394d7460a35b03100ef6b4fc7c1ffdab252db922f6d9ed4be1bacfb0600

  • SSDEEP

    12288:r4+6MmnlL09PI5Rgd4VjxHAurYyQfEGzvKTH4E:rRXlI/g61HPrYyGEGzvKr7

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO 2100312939.exe

    • Size

      970KB

    • MD5

      57cd72a887cca62b44190dabce0b7b5a

    • SHA1

      f156897406aa8dbb2a2ed30d8176e8c5271a14b7

    • SHA256

      985b9ac7e5d1bb43b27e335d0a280a09633a5798c30d9ebd4468d0eebe2b2cff

    • SHA512

      92f21ac88e3884ad233f757e65a9cfa9fa9f929dfdab5af1a26944a1242f8da8b7cd9042b8a90f1d33e8202d6a9ad346cd90a3cfacd1376b3632fd139ec6bcbf

    • SSDEEP

      24576:SzEn9wQOIpppupppppfyAIpppupppppfyIAflI/gK1J9rYycEGzvKC4Q:jn+lyAlyIWlI/xDrYnnziCh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks