General

  • Target

    c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b

  • Size

    695KB

  • Sample

    240719-bdgzzavgmk

  • MD5

    2ad8181dcb3d4983f5f03e8ac5f8d2a2

  • SHA1

    e2f3e332bda9aa7b794b68e134bffef93f8eaf44

  • SHA256

    c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b

  • SHA512

    2845247be4bb30ed6c4e98afa67d7d48ac067e7f472fb2db99b919880e011153b5d54be95e2d64b464a5c38715f19aac3fb942bb2d09179ccea34f0c8945d219

  • SSDEEP

    12288:uYV6MorX7qzuC3QHO9FQVHPF51jgcEM9js/k/oRVJZVsirlvxom4Zs+:NBXu9HGaVHd9js/dV1nEs+

Malware Config

Targets

    • Target

      c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b

    • Size

      695KB

    • MD5

      2ad8181dcb3d4983f5f03e8ac5f8d2a2

    • SHA1

      e2f3e332bda9aa7b794b68e134bffef93f8eaf44

    • SHA256

      c94709dafba503c64eadc628c7497db95ed36f1e1296ef639c2c6be1154f323b

    • SHA512

      2845247be4bb30ed6c4e98afa67d7d48ac067e7f472fb2db99b919880e011153b5d54be95e2d64b464a5c38715f19aac3fb942bb2d09179ccea34f0c8945d219

    • SSDEEP

      12288:uYV6MorX7qzuC3QHO9FQVHPF51jgcEM9js/k/oRVJZVsirlvxom4Zs+:NBXu9HGaVHd9js/dV1nEs+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks