General

  • Target

    OFFER REQUEST.exe

  • Size

    369KB

  • Sample

    231126-wztacaah46

  • MD5

    53981e94bf9b125871ff3d555fcb6e18

  • SHA1

    9d4ba161bf60e243951b436feb14c2c0d3284a73

  • SHA256

    42bb4ea726a68142140dbe3953e6027f5176aeb359d06ca71652bfd61a3a4898

  • SHA512

    b365626996d9d3c4dd2fede34e4fd6a2874f4c75f5f4671bc261bdfea36419dc473b790f6fa5c41d82c7beb0f5fad375f6ad14f059eaeaa2784f092d82cf39f9

  • SSDEEP

    6144:bNDlOltlhJka8EOHDn7m8aviLBdRIdpoqgYT83+KAmfL3:but7JkzEOjn7mHviPlA8OxU3

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      OFFER REQUEST.exe

    • Size

      369KB

    • MD5

      53981e94bf9b125871ff3d555fcb6e18

    • SHA1

      9d4ba161bf60e243951b436feb14c2c0d3284a73

    • SHA256

      42bb4ea726a68142140dbe3953e6027f5176aeb359d06ca71652bfd61a3a4898

    • SHA512

      b365626996d9d3c4dd2fede34e4fd6a2874f4c75f5f4671bc261bdfea36419dc473b790f6fa5c41d82c7beb0f5fad375f6ad14f059eaeaa2784f092d82cf39f9

    • SSDEEP

      6144:bNDlOltlhJka8EOHDn7m8aviLBdRIdpoqgYT83+KAmfL3:but7JkzEOjn7mHviPlA8OxU3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks