General

  • Target

    c3453962cdff8dba0a9acb711b28847fd25ca77e5bf0a09719202a81f8fbbf1e.exe

  • Size

    718KB

  • Sample

    240523-cfnqzahh68

  • MD5

    05f04b9c3e44ea9bbe1e385367bf0eda

  • SHA1

    27b20c39f39769c831c5cd8f7963918fe5e7dca9

  • SHA256

    c3453962cdff8dba0a9acb711b28847fd25ca77e5bf0a09719202a81f8fbbf1e

  • SHA512

    fdbac788669c9d35035a0cb803198a53108b3afcbdb442191919edaa6be915f1603e4b961222ff33d5d57e9cbda634f81e2aa55366d51e20a42fbf03ba36e424

  • SSDEEP

    12288:TWMNwBITAzbvhkS91TEiW/c9yAyK8IAWALSUFZg/+g4YZSZ++lVoLS2A/ARMF:kouEt/LCaSIZe4YZKLoDxR

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      c3453962cdff8dba0a9acb711b28847fd25ca77e5bf0a09719202a81f8fbbf1e.exe

    • Size

      718KB

    • MD5

      05f04b9c3e44ea9bbe1e385367bf0eda

    • SHA1

      27b20c39f39769c831c5cd8f7963918fe5e7dca9

    • SHA256

      c3453962cdff8dba0a9acb711b28847fd25ca77e5bf0a09719202a81f8fbbf1e

    • SHA512

      fdbac788669c9d35035a0cb803198a53108b3afcbdb442191919edaa6be915f1603e4b961222ff33d5d57e9cbda634f81e2aa55366d51e20a42fbf03ba36e424

    • SSDEEP

      12288:TWMNwBITAzbvhkS91TEiW/c9yAyK8IAWALSUFZg/+g4YZSZ++lVoLS2A/ARMF:kouEt/LCaSIZe4YZKLoDxR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks