General

  • Target

    68be47662747cc082d2d1df710e743ac1e2c59a4b77ab2779a0bd80127ea733e_JC.exe

  • Size

    828KB

  • Sample

    231011-re4s5adh64

  • MD5

    23cafb7bb62ae6f6f5b64a6bd811ab88

  • SHA1

    ae03f75e7f486c2ccd6bbfb2b6a87e0603fde365

  • SHA256

    68be47662747cc082d2d1df710e743ac1e2c59a4b77ab2779a0bd80127ea733e

  • SHA512

    76491a303ecd11238fe86f6d760dd6b9c2a8ec8a89a642ccd4287a62bff9b84516daadc58f0f0fa847542d811f75e35fb0d8ed31f6505ab68f767c7e7fda9714

  • SSDEEP

    12288:tVilEUhySQPFFJM+sDwExuEJeTWVpf7kq7Vv9MVZgrmSjTdM0IvvAgYsDAaCOc4c:tYLhUev7yWHfx9MVZgv

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      68be47662747cc082d2d1df710e743ac1e2c59a4b77ab2779a0bd80127ea733e_JC.exe

    • Size

      828KB

    • MD5

      23cafb7bb62ae6f6f5b64a6bd811ab88

    • SHA1

      ae03f75e7f486c2ccd6bbfb2b6a87e0603fde365

    • SHA256

      68be47662747cc082d2d1df710e743ac1e2c59a4b77ab2779a0bd80127ea733e

    • SHA512

      76491a303ecd11238fe86f6d760dd6b9c2a8ec8a89a642ccd4287a62bff9b84516daadc58f0f0fa847542d811f75e35fb0d8ed31f6505ab68f767c7e7fda9714

    • SSDEEP

      12288:tVilEUhySQPFFJM+sDwExuEJeTWVpf7kq7Vv9MVZgrmSjTdM0IvvAgYsDAaCOc4c:tYLhUev7yWHfx9MVZgv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks