General

  • Target

    Mt103.exe

  • Size

    609KB

  • Sample

    240624-kh5q9stbnc

  • MD5

    4b4c0296f03c4696fc932f25b106c67e

  • SHA1

    3013d914be42bc00169033ab69f3a5322a92c602

  • SHA256

    f31627c0be61c3d8cd84264e59bab7e0eeadbd07170f69b0dd08883e7b3591e1

  • SHA512

    ad9d03bd56863b6bc2bd9680489559dd04bec53c8d717cbecc0a15f44addb7681c67d4c5c421b53854c338ecf589542c3ffd59ee207e6981eecc4630add780d4

  • SSDEEP

    12288:7YV6MorX7qzuC3QHO9FQVHPF51jgcUq0gG+d69A7iaIhuvyKehO:YBXu9HGaVHB0TtAeaSyy34

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Mt103.exe

    • Size

      609KB

    • MD5

      4b4c0296f03c4696fc932f25b106c67e

    • SHA1

      3013d914be42bc00169033ab69f3a5322a92c602

    • SHA256

      f31627c0be61c3d8cd84264e59bab7e0eeadbd07170f69b0dd08883e7b3591e1

    • SHA512

      ad9d03bd56863b6bc2bd9680489559dd04bec53c8d717cbecc0a15f44addb7681c67d4c5c421b53854c338ecf589542c3ffd59ee207e6981eecc4630add780d4

    • SSDEEP

      12288:7YV6MorX7qzuC3QHO9FQVHPF51jgcUq0gG+d69A7iaIhuvyKehO:YBXu9HGaVHB0TtAeaSyy34

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks