General

  • Target

    a63fcda918d43ba074a512bc5c9198cdbb033ecc901dd3e3083d66a1814bf058

  • Size

    585KB

  • Sample

    240523-cve3daad7v

  • MD5

    ae64578ef5f0dec88d580b719d432c84

  • SHA1

    620cb6e89617e12594dc303cb03fb6bbaca48a4c

  • SHA256

    a63fcda918d43ba074a512bc5c9198cdbb033ecc901dd3e3083d66a1814bf058

  • SHA512

    d4dd14aad8627601d97d5a43cb5bcf8134acd04d1b6721065709542a5efe089e23d2ffa2544e999c087a644c2968971b88e178f2b9aee8cd512fa6ccebe79cbb

  • SSDEEP

    12288:K3rWQ9Evc5D46vAcml7IhKEUPOp0+vlXL+HhGwRxMGAcquTxWjrGpQSE:KbWQ9qGDprE2DlCRLActcjrHSE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Inv240521# PTYR (BC24-05) BL COPY_PDF.exe

    • Size

      1009KB

    • MD5

      9b450594b985d865f7fd3043a14b7b8e

    • SHA1

      69888184c00ddcae7b6a13e97bd91f8bf879922b

    • SHA256

      4de7625d54b60786d2e5fb6aa9d8401a6341534907dbbf5349150d0a1d5027a5

    • SHA512

      5d344da7a60c3de08b09f0ae7192b8711ed0f89f68d254e9eb0597c8ee4e41f1431278067a85f7ad82b67c8bdbaab20c93598e8884e0ae90f94569aba199589d

    • SSDEEP

      24576:EAHnh+eWsN3skA4RV1Hom2KXMmHaZxjx1iT5:Th+ZkldoPK8YaZY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks