General

  • Target

    a595221b4b53359bfbbb7ee40b0054077515c57cfabb4b940bb24f475810144f.exe

  • Size

    731KB

  • Sample

    240308-cxtcsada29

  • MD5

    92e8a06775112534424abae5c1be6726

  • SHA1

    88069177eb592c8cc1531f1ef1584db258cd9b8f

  • SHA256

    a595221b4b53359bfbbb7ee40b0054077515c57cfabb4b940bb24f475810144f

  • SHA512

    a8285b47efd8a740a3264b6ef9b336120a5667a1fe1ba7cb00aaacf6abbfd1e119d64cc61ffae91e4ca5f317e230785d1e4b63c9869390776dfb7e67f1a44249

  • SSDEEP

    12288:bJLbois3QZTLdgdNaGO1Dk/9/Bfj9jKIiQpwE/gMBGMNReTFaPcAqh:bJLb1+uLdgdNyIF/BLGQCE/gMBzNezh

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      a595221b4b53359bfbbb7ee40b0054077515c57cfabb4b940bb24f475810144f.exe

    • Size

      731KB

    • MD5

      92e8a06775112534424abae5c1be6726

    • SHA1

      88069177eb592c8cc1531f1ef1584db258cd9b8f

    • SHA256

      a595221b4b53359bfbbb7ee40b0054077515c57cfabb4b940bb24f475810144f

    • SHA512

      a8285b47efd8a740a3264b6ef9b336120a5667a1fe1ba7cb00aaacf6abbfd1e119d64cc61ffae91e4ca5f317e230785d1e4b63c9869390776dfb7e67f1a44249

    • SSDEEP

      12288:bJLbois3QZTLdgdNaGO1Dk/9/Bfj9jKIiQpwE/gMBGMNReTFaPcAqh:bJLb1+uLdgdNyIF/BLGQCE/gMBzNezh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks