General

  • Target

    da17d3028ed35dd6bc4e01a0724f9915f7449c3371eb6e86d4be6424a4d82e6c

  • Size

    729KB

  • Sample

    231205-v3s83sdc6v

  • MD5

    3d78ffe64c257aa974a08e0bdefa3218

  • SHA1

    408fd930d7d9b07a79c02a7e5d270abc8e341823

  • SHA256

    da17d3028ed35dd6bc4e01a0724f9915f7449c3371eb6e86d4be6424a4d82e6c

  • SHA512

    322eb95e05fb181d12af13915b7cd956d02d1de902b156869e4e01a21e429e09fc9987d79899a572628bdd8bac7735bd99dc228a5fcb7fa2e93f28afbc147bf6

  • SSDEEP

    12288:3tBheYI0fRSH+QnHlU3xV2A3LfLHwaQ+V7/wL0a6vOKfmY/gYfozWpmHfiCyKeaB:3zheYIKEH+6Qxc2rrwaQ+V/wL0adKfvi

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SHIPPING DOCUMENTS.exe

    • Size

      812KB

    • MD5

      7fa63943be0c41feebbf5e22cef17cd5

    • SHA1

      29e622e497c415607c0f7f7c911e223ac0212669

    • SHA256

      8c9e69c484e159acd88a9c50d70db9f104d9cd804ac6855d657c077c54faa4ac

    • SHA512

      695d16dc6a28e6f0ca3ac7458a09203b11191a90998812db9d82bfc3e0f66a8d01557c9460f5553e28ed0763fdbf66cd0d26d917c403a91d63912c8fe3a736a4

    • SSDEEP

      24576:o34/up+pJBLmeqhqCQoVNwL0aJKp//g0fo902jKFNe2qIa:o38PJRUQsyL0aJKBIL0DI2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks