General

  • Target

    2813e882b91cad5d823ecdd539ac84de.bin

  • Size

    334KB

  • Sample

    230831-blt99scb55

  • MD5

    160ff9cdda78ad25663f1e9bb37d39a4

  • SHA1

    2f366f22e00888f89c8024321612b8bb42f06054

  • SHA256

    091e5a25bf29f9deeb06524170ce2e5ceac741e41f270e01df9e9358899b10c6

  • SHA512

    d14925f25d383849cd6c39f47f75da37ceced139948cf844dd28ee7a43c63b00785ef13c07ff5b7d63e567bf4fb7eccc3dcdfa70da9bbaf493a0b383f827d3da

  • SSDEEP

    6144:53owRPBm+5t/a6xHbQgRnbj1j5qudZfapqpESUug63xoochaDuDjmO3L/aDmeDLG:5Y8VyWbtLFqIfSqpDUk3jDuDhO5D8dSy

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8a6bb908578673c427b94360e93909c21ae1e69a09f0378bf2d2ab3f43cf60a6.exe

    • Size

      820KB

    • MD5

      2813e882b91cad5d823ecdd539ac84de

    • SHA1

      c1e3d38945744133d009665c6a2ea5b5e112d0f3

    • SHA256

      8a6bb908578673c427b94360e93909c21ae1e69a09f0378bf2d2ab3f43cf60a6

    • SHA512

      60261a846b5c29db2aabbb048fce0896534b10aece7129c0cf346c501b916e3783264711d9aa686c4726ead143729fc7c576d8c51f2cabcf914c92df8f9c149a

    • SSDEEP

      12288:l+KhznbK+ZFnnFnuoc/a8NRP1tscW2f7R3lu/C6mwlial4jILd4jNJPKT:MIT2qeNRP1tscWIf6Dgc2B2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks