General

  • Target

    f2745b58e1afef569a2d1825e984c1010fb364b13fc0b6c1cc23d13ababb9925

  • Size

    621KB

  • Sample

    240619-cxq8eswgkn

  • MD5

    0d8b99c9024079f7dfe44081fe30b900

  • SHA1

    71a516bdcf6fee5b0eebbc1ebf0bdc9ff10fadf4

  • SHA256

    f2745b58e1afef569a2d1825e984c1010fb364b13fc0b6c1cc23d13ababb9925

  • SHA512

    8798b82ef1f1ea46c3174c4fd611f34ac8cf1087c9fd2a17fab9551ba721eb22968ae7562a035e7448d32d9695be0869928554ab29158e778fa883eb8842f990

  • SSDEEP

    12288:6yG9zJ2rXvqIsXUiflmNl1fFQEX+mpTGuurRkFnqRQ53dQ25QA:PYJW/qNUidmNvFQKTGuu1Zk225QA

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      TNT AWB AND COMMERCAIL INVOICE TRACKING DETAILS.exe

    • Size

      1.0MB

    • MD5

      a494e3769a2f84e1338583c536444d2b

    • SHA1

      50e68f707dce4a35bd6a140efbe33c26c780f0ae

    • SHA256

      377df318502b404bf7b0a8cb059aa3eba749e06b366e13c393ebfd588b4a6b7b

    • SHA512

      76b148e3df7d06eaa716f5c38240aee3060fcaf9abbcb4e2b959539a1494d986218bd89a71ab2eaa223a11509edbeb2c6091d825f05b1b8e28b3b70d2d56f2be

    • SSDEEP

      24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaQLGWvk2Ys5:xh+ZkldoPK8YaQLGWvRv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks