General

  • Target

    e9fd9f10960bec70a3f17c566634c7091a42c406b9ba3a22ec1f02c5f6973a11

  • Size

    729KB

  • Sample

    231205-vm4pwadd56

  • MD5

    630ddb532469ecae99b55015d23aac19

  • SHA1

    978b54b7cb960fb212e0b4162b8e458fe70beffb

  • SHA256

    e9fd9f10960bec70a3f17c566634c7091a42c406b9ba3a22ec1f02c5f6973a11

  • SHA512

    9b9d0e3d8612b85c358e3e52b94391a7443e98789f7d57757d2e6a0a173519630ec5c1a81985e0a7c21cf6b3054fc0c69f5f06e48549c65464cc6a01d132a4d5

  • SSDEEP

    12288:KtBheYI0fRSH+QnHlU3xV2A3LfLHwaQ+V7/wL0a6vOKfmY/gYfozWpmHfiCyKeaY:KzheYIKEH+6Qxc2rrwaQ+V/wL0adKfvb

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PRE ALERT NOTICE.exe

    • Size

      812KB

    • MD5

      7fa63943be0c41feebbf5e22cef17cd5

    • SHA1

      29e622e497c415607c0f7f7c911e223ac0212669

    • SHA256

      8c9e69c484e159acd88a9c50d70db9f104d9cd804ac6855d657c077c54faa4ac

    • SHA512

      695d16dc6a28e6f0ca3ac7458a09203b11191a90998812db9d82bfc3e0f66a8d01557c9460f5553e28ed0763fdbf66cd0d26d917c403a91d63912c8fe3a736a4

    • SSDEEP

      24576:o34/up+pJBLmeqhqCQoVNwL0aJKp//g0fo902jKFNe2qIa:o38PJRUQsyL0aJKBIL0DI2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks