General

  • Target

    acc49c5f78975ac30381ceade4e9d659d3f67f3b32f5eff433b667881f723689.exe

  • Size

    853KB

  • Sample

    240629-b4fvlaxhrg

  • MD5

    39fa778ffd331012903dd2ef081858ca

  • SHA1

    adefc136f4fad250057e24903f2143ad21acab46

  • SHA256

    acc49c5f78975ac30381ceade4e9d659d3f67f3b32f5eff433b667881f723689

  • SHA512

    ef93e3a9acf9e2ded5c40dc2d8849757190cb6665186211b4818307931f9b4ef8c3219d728ee52dcc3d79aec94c87ec75ab71f7c206c7afae8c2d65662930871

  • SSDEEP

    12288:Z+S+SFXRuTwyC6flXB3pAJFvkP5UfazdkOORQUiLcXW3XJ64DGzZwueipqDKM:owRuljp0v6U0SOCEcXWZ64mZwWM

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      acc49c5f78975ac30381ceade4e9d659d3f67f3b32f5eff433b667881f723689.exe

    • Size

      853KB

    • MD5

      39fa778ffd331012903dd2ef081858ca

    • SHA1

      adefc136f4fad250057e24903f2143ad21acab46

    • SHA256

      acc49c5f78975ac30381ceade4e9d659d3f67f3b32f5eff433b667881f723689

    • SHA512

      ef93e3a9acf9e2ded5c40dc2d8849757190cb6665186211b4818307931f9b4ef8c3219d728ee52dcc3d79aec94c87ec75ab71f7c206c7afae8c2d65662930871

    • SSDEEP

      12288:Z+S+SFXRuTwyC6flXB3pAJFvkP5UfazdkOORQUiLcXW3XJ64DGzZwueipqDKM:owRuljp0v6U0SOCEcXWZ64mZwWM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks