General

  • Target

    38e575936474dbb14355248457aa106e0526b03062bea21403261eb4629675cf

  • Size

    582KB

  • Sample

    240328-bflqyaaa66

  • MD5

    1b0ab221f5e0263bc3231742801c9d14

  • SHA1

    766bad4af65ab4469fed4589a4f491157baca226

  • SHA256

    38e575936474dbb14355248457aa106e0526b03062bea21403261eb4629675cf

  • SHA512

    76cde5678d19b4efdd8b3d6502319a6f74ea4cd5ebee8f053f10fa3ed6ff222555b778b31064650c8fcb2486bf04722486729795b159d412b3181f523d44e511

  • SSDEEP

    12288:wOcywlSX8vgCCIPBS6pvqJIXZCw2ScUDco8qbiGPY07iGo/:wpo8vPB/v8IpQrRSPW

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      38e575936474dbb14355248457aa106e0526b03062bea21403261eb4629675cf

    • Size

      582KB

    • MD5

      1b0ab221f5e0263bc3231742801c9d14

    • SHA1

      766bad4af65ab4469fed4589a4f491157baca226

    • SHA256

      38e575936474dbb14355248457aa106e0526b03062bea21403261eb4629675cf

    • SHA512

      76cde5678d19b4efdd8b3d6502319a6f74ea4cd5ebee8f053f10fa3ed6ff222555b778b31064650c8fcb2486bf04722486729795b159d412b3181f523d44e511

    • SSDEEP

      12288:wOcywlSX8vgCCIPBS6pvqJIXZCw2ScUDco8qbiGPY07iGo/:wpo8vPB/v8IpQrRSPW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks