General

  • Target

    fcc73e0f15f5ea39a9683a4e545263ce548278650beb4c4c36db3fd443133fdb.exe

  • Size

    742KB

  • Sample

    240606-cjwkzsfd56

  • MD5

    b368bfdd1b4cddcfcf8e843a8972fb11

  • SHA1

    0cd5fc60caf4d14ba898d39608b7228f99df393e

  • SHA256

    fcc73e0f15f5ea39a9683a4e545263ce548278650beb4c4c36db3fd443133fdb

  • SHA512

    b3c4f591ed09b9a53b6f1f8e9e5c9ccdaaf3c93f7c91ed0c35b7904f6da56a97e9634ae1216925865e1b4cb5fb5b7c8e2b702e08c0123be7014d3f2c09b8dd09

  • SSDEEP

    12288:U9a4GFx/lUSE2qrpNCskXkImdzG4K3/6uCTAInZtNZ73pLDOZd05y61Zj52+vNnG:U9GFNlUXkX4o16VU47s+y6LF2cnOB6lC

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      fcc73e0f15f5ea39a9683a4e545263ce548278650beb4c4c36db3fd443133fdb.exe

    • Size

      742KB

    • MD5

      b368bfdd1b4cddcfcf8e843a8972fb11

    • SHA1

      0cd5fc60caf4d14ba898d39608b7228f99df393e

    • SHA256

      fcc73e0f15f5ea39a9683a4e545263ce548278650beb4c4c36db3fd443133fdb

    • SHA512

      b3c4f591ed09b9a53b6f1f8e9e5c9ccdaaf3c93f7c91ed0c35b7904f6da56a97e9634ae1216925865e1b4cb5fb5b7c8e2b702e08c0123be7014d3f2c09b8dd09

    • SSDEEP

      12288:U9a4GFx/lUSE2qrpNCskXkImdzG4K3/6uCTAInZtNZ73pLDOZd05y61Zj52+vNnG:U9GFNlUXkX4o16VU47s+y6LF2cnOB6lC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables packed with or use KoiVM

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks