General

  • Target

    db813eacc12617bc14f34bc81e147c65.bin

  • Size

    296KB

  • Sample

    230901-ch5ghabf4v

  • MD5

    d22c189c83d871492dd1b69b7183cb82

  • SHA1

    1354a35702eb9dfe77164d8bfb53d3dff3544cd9

  • SHA256

    0c3e2cb8486ccdc6e64b443642f107bfd93752f4bdbc566cc2cf8643aba6f8fe

  • SHA512

    6d139f35bcccc7b3860bed6c5215b556b928f611da8bd141c7b166d72ff234f9550fc5b1b82235d4329386736751ae5fc41ee6dc7070f6b6b29518cdf602d264

  • SSDEEP

    6144:IEp+ylCEnV+Co55gJECqTTKYWB6uL0rFKHeO9Aff9hBdEkgCCNoo9:JtlCkV+oJEkYWBfrHeO9Aff/BdEkgCCj

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Invoice #290202308.exe

    • Size

      814KB

    • MD5

      5f748b029a17817417949dda750cf225

    • SHA1

      7a674c9b1c0c632f83bd27091bd769ea88daf215

    • SHA256

      b63ed1999685c3144cb61f9091b54f33fbcf657f3ea910b11e57e5cf8f1bf2c7

    • SHA512

      b879652156e2cbf7c248bb7bae0ee8dcf477564770f45c3b634dcca2e87d29b725ff2d50b4fbc0db806a3e8b829c50cdc5349968ddb3ddfafe74b060a823ae29

    • SSDEEP

      12288:LkTcSEZMcd4LmzBaGuIvNtbKq+LoTQ7dyiqWMRK1jFlENQ/FBev+40s:6eIubueTb0cTQJyiaK1jql

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks