General

  • Target

    9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4

  • Size

    613KB

  • Sample

    240330-bk1qnaed78

  • MD5

    b32eb4a8fe11ff1285c91012101a6b1c

  • SHA1

    323ef8a89c0818681b876e9dd38a766a7ff7ea9c

  • SHA256

    9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4

  • SHA512

    58f4c116b178e438682bb4c70ec780863b8fdac10327c472160b7bb14c864448070862728a8b9f53fc827c018e418937d7999f6267b9b7cb2e69f20e0629dc15

  • SSDEEP

    12288:YpqoRGAfwtAerE0Sz+lT6jkdznt7sKNVFyinAfQdpTQlefYdtm68ZqV4:4RGcwGMmz+dpzn1E7fQd1IefYqqV4

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4

    • Size

      613KB

    • MD5

      b32eb4a8fe11ff1285c91012101a6b1c

    • SHA1

      323ef8a89c0818681b876e9dd38a766a7ff7ea9c

    • SHA256

      9c4fc8863b69831ba6b261d813788cd49677c2f02fe9c82ad8426141cd326ef4

    • SHA512

      58f4c116b178e438682bb4c70ec780863b8fdac10327c472160b7bb14c864448070862728a8b9f53fc827c018e418937d7999f6267b9b7cb2e69f20e0629dc15

    • SSDEEP

      12288:YpqoRGAfwtAerE0Sz+lT6jkdznt7sKNVFyinAfQdpTQlefYdtm68ZqV4:4RGcwGMmz+dpzn1E7fQd1IefYqqV4

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Modify Registry

5
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks