General

  • Target

    50ed78b1eb11b242ed2a305d34b000cb.bin

  • Size

    135KB

  • Sample

    230826-bpmdtshf7v

  • MD5

    dad663e4b133c10b59661fac63d9d846

  • SHA1

    8d7da1208c476f65d29fcd820959c0236514ebf7

  • SHA256

    4297690127d31446f04165718f266fa96ab7e349b3f54209865b9cf9de611db0

  • SHA512

    9fdb70fa88129f050304b66c5d4a639a850a4aa8445b0915b51ded008dd111228af7d3991571360636c2a37409e26b042171f8ca58d1f1cf8bbf4485a4e6ab56

  • SSDEEP

    3072:IZNheiQXmlA6d0ui9PHxps/j5mDu4n5pu2uScwPCDm:a2EA6dSZRGFmy45A2uScwSm

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      a35a34ff770aabda07c6820d69d7f941b8b866d2b60fde248bb5f949c43831dd.exe

    • Size

      293KB

    • MD5

      50ed78b1eb11b242ed2a305d34b000cb

    • SHA1

      7d2c0633172ee778d80fce4122b75697587880bf

    • SHA256

      a35a34ff770aabda07c6820d69d7f941b8b866d2b60fde248bb5f949c43831dd

    • SHA512

      e794b64ba557eab3bf3d577280f5e6b0ecbee3499c66919e88815b7e2e4d8dcb06a31dfb1c14a02da76606deeab9901473af248684c52259cce58bf53ed96942

    • SSDEEP

      6144:p7zNGwdtSU33enO2663SMObh7rNYqBbrXSCi4BB7e7Sx0DeDOi/S:p7zNGwDSU+nOhbn7pbrXPi4BB2BDfia

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks