General

  • Target

    b7f8e5d5eb84ea1419064f1d85b0e6570f9fb2b9cbc5eb72b11e463a3d7e6314.exe

  • Size

    1.4MB

  • Sample

    240522-rvv6xsed69

  • MD5

    9fbf1890e0236da00be34bab1b6979c9

  • SHA1

    4d9f66bdc24dda4355870001a1e25494bb0e411c

  • SHA256

    b7f8e5d5eb84ea1419064f1d85b0e6570f9fb2b9cbc5eb72b11e463a3d7e6314

  • SHA512

    bf827a0c4019af1aa565a82f747872bd014159dcc73fd8d76b08051026ff997b41797279544b78b2e5434fb3cd3d72405188274bb145a57a293d7051f459796e

  • SSDEEP

    24576:OUzKsG5DaqdRk6JSpu1Ho6tsPqXz+ULhOxJ/NDCB32mJ+sz+D8yKnSk6Y8anr/:fr01nz+Ucf/UB3PJ+sKgyKQrar/

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      b7f8e5d5eb84ea1419064f1d85b0e6570f9fb2b9cbc5eb72b11e463a3d7e6314.exe

    • Size

      1.4MB

    • MD5

      9fbf1890e0236da00be34bab1b6979c9

    • SHA1

      4d9f66bdc24dda4355870001a1e25494bb0e411c

    • SHA256

      b7f8e5d5eb84ea1419064f1d85b0e6570f9fb2b9cbc5eb72b11e463a3d7e6314

    • SHA512

      bf827a0c4019af1aa565a82f747872bd014159dcc73fd8d76b08051026ff997b41797279544b78b2e5434fb3cd3d72405188274bb145a57a293d7051f459796e

    • SSDEEP

      24576:OUzKsG5DaqdRk6JSpu1Ho6tsPqXz+ULhOxJ/NDCB32mJ+sz+D8yKnSk6Y8anr/:fr01nz+Ucf/UB3PJ+sKgyKQrar/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks