General

  • Target

    f3cdea59453660eef15954fef8a579f335a27d3c2d0cf6bb836332b63589b4ab

  • Size

    2.5MB

  • Sample

    240724-bn23wsshkg

  • MD5

    578a3a208fe4f2345079176d960855c9

  • SHA1

    7b06be07e1ee07aced123c6e82bbffe31c85e4da

  • SHA256

    f3cdea59453660eef15954fef8a579f335a27d3c2d0cf6bb836332b63589b4ab

  • SHA512

    c6593a91eff25d9d7be09f75a2132e924028e04417c3a371de1ad688a1450e0ce0533184e81359cfe3bd91273491893ee62b3c44bc88c2a587037485b02877ea

  • SSDEEP

    12288:+xrTwb8RgRpdMzIrlY2Zfqkc6tSdWSjIXal1x0iBF+5Gl/S8ie4OcuLfQfGzMS/:2rMzIulYxkc1cScXiYQxvfuIz/

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      f3cdea59453660eef15954fef8a579f335a27d3c2d0cf6bb836332b63589b4ab

    • Size

      2.5MB

    • MD5

      578a3a208fe4f2345079176d960855c9

    • SHA1

      7b06be07e1ee07aced123c6e82bbffe31c85e4da

    • SHA256

      f3cdea59453660eef15954fef8a579f335a27d3c2d0cf6bb836332b63589b4ab

    • SHA512

      c6593a91eff25d9d7be09f75a2132e924028e04417c3a371de1ad688a1450e0ce0533184e81359cfe3bd91273491893ee62b3c44bc88c2a587037485b02877ea

    • SSDEEP

      12288:+xrTwb8RgRpdMzIrlY2Zfqkc6tSdWSjIXal1x0iBF+5Gl/S8ie4OcuLfQfGzMS/:2rMzIulYxkc1cScXiYQxvfuIz/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks