General

  • Target

    b419d8724f97769becff1367e8b53966.bin

  • Size

    626KB

  • Sample

    231126-cccvased91

  • MD5

    0a752dc00b8edc37b54e4a2398b67f3d

  • SHA1

    5889ba4c25ceebe5d62bddda6eeabf76842b6ae8

  • SHA256

    96b3d5d0c076c995584f609bf2221cadec07da6fe45a3680bd55a7fdfc4dd6b5

  • SHA512

    b20deb5ed8ed332235a476a358edb81b5bc87606e4aacf7fcad80c9228e378b7f3631ec9648129cf83e908ddaa5d9f4c254de26512ebd0c3f2b3dc778b46bc71

  • SSDEEP

    12288:Q1wdkbHHRdAJs8f6/fMuF4yx3buuUdghSUnnlTX51dwtmJHkrWL2B0KXhCX:Q1tHkDsMuFP3b9ugdtX51/JzL2BdxG

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      4c98e73ad9fc8d3a97d2bf372165d819c2c9db0fcf1e0fafb742749dc0392a72.exe

    • Size

      680KB

    • MD5

      b419d8724f97769becff1367e8b53966

    • SHA1

      58765b51bf6ebee89b085dda047f06ab106b3cbd

    • SHA256

      4c98e73ad9fc8d3a97d2bf372165d819c2c9db0fcf1e0fafb742749dc0392a72

    • SHA512

      d2ffcd6795c7a27ec447db34215ae7112bb535173fa0a05625e901ce1565312445ebc6cfdecce2fd2466a911a1e1b87bfd0f28d672fb97a771a62b333b71be62

    • SSDEEP

      12288:AE6jD/9P5z5gF31Y7BBnuwVl2aUBR9aD/TZTXVKCTENz:AtD/9PhSF3Utz2F9aDdLUcEN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks