General

  • Target

    40e55d317d745a766fcddf1696030e2dfff6ce54685cf85b6f20c6a978e58632

  • Size

    727KB

  • Sample

    231204-vhv7yadc52

  • MD5

    8e968bf5eca5b8cd5bd213144a65cb60

  • SHA1

    2157cf7e1bc6e0d798e61b3b9ba3f34d6c717660

  • SHA256

    40e55d317d745a766fcddf1696030e2dfff6ce54685cf85b6f20c6a978e58632

  • SHA512

    b115ed6c4dea5fe2c9005eb21f7fc1956502fc7d3e79f8d433dc70fb9c24a7626f5713f714d982129116ca1b7a732f8b8e53ecf0113041850f5bed04ca5788ad

  • SSDEEP

    12288:2Ihrz56hQpN55TWQblAw5ja5JvqPgkRmsj4yu/d6gvw9/QuRszqDB5WJjeoKJJ0q:OQ55aQBAWjaPi4+9qlw9IuO6B5WJrKJf

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      chima.exe

    • Size

      812KB

    • MD5

      9fdc58e77c21bdc493d017806c814791

    • SHA1

      87d45946cb600a4c1bcb30269187124c5fa0e8d1

    • SHA256

      f17888c39de05db240eac5f53edc8ad9c1b1512c428dfcce5078bb9636395a8d

    • SHA512

      104b1ac6a5dde7bbff09fd40589e2ff7bae999901b7eaa6ba5cb5419112fdd206a2c78445425a63905223e7d014250f2d4dd69a64820166f6be56996bb8a8337

    • SSDEEP

      12288:WWytW8G34/uK45+po2cOe9aPgt4npNKacCeIvzMGD1tkChTlCoXtn70IQIVAxqn:l34/up+pJw6BnpgacCeIlDZTlHdndwx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks