General

  • Target

    308004785363cf352a7c339d778f301bd25686dc8463190a41f3a5f65eb6c1dc.exe

  • Size

    1.1MB

  • Sample

    240612-bmdc5sxdrm

  • MD5

    e76975d634d228179adc45cad8f2000d

  • SHA1

    9e5d85b6a9ce9c4ca3793c7f140e57e9ed024db3

  • SHA256

    308004785363cf352a7c339d778f301bd25686dc8463190a41f3a5f65eb6c1dc

  • SHA512

    f11c57d1c92d3ab7542bdc135982533cba6213835a2f0fa38bd3f589b5ce03239de37b1ca42c001dfb9d747e1aca587e14c0366d4467859dd53bec6d407c0d6d

  • SSDEEP

    24576:cAHnh+eWsN3skA4RV1Hom2KXMmHadZz5CA9RiAPRx5:7h+ZkldoPK8YadZz5CA9rPh

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      308004785363cf352a7c339d778f301bd25686dc8463190a41f3a5f65eb6c1dc.exe

    • Size

      1.1MB

    • MD5

      e76975d634d228179adc45cad8f2000d

    • SHA1

      9e5d85b6a9ce9c4ca3793c7f140e57e9ed024db3

    • SHA256

      308004785363cf352a7c339d778f301bd25686dc8463190a41f3a5f65eb6c1dc

    • SHA512

      f11c57d1c92d3ab7542bdc135982533cba6213835a2f0fa38bd3f589b5ce03239de37b1ca42c001dfb9d747e1aca587e14c0366d4467859dd53bec6d407c0d6d

    • SSDEEP

      24576:cAHnh+eWsN3skA4RV1Hom2KXMmHadZz5CA9RiAPRx5:7h+ZkldoPK8YadZz5CA9rPh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks