General

  • Target

    05b6a5d5670beafdc5e9f6e194b1afe8340447cb9d2943e1e6385e5fb47200dd.exe

  • Size

    1.1MB

  • Sample

    240726-pexcyaxamk

  • MD5

    24ab32e79087b3a3977c99fb8a1d8d93

  • SHA1

    89d27447d0d71788b17d85b09301750490224dd4

  • SHA256

    05b6a5d5670beafdc5e9f6e194b1afe8340447cb9d2943e1e6385e5fb47200dd

  • SHA512

    37c07f310478ea2639c322ceaa49a1e3c62afa56191114c8e29ae961f2312f83c66fc7300c803f96a66b8acbdb4644c2f98363cc0a3a04084caeaf804e83c8c2

  • SSDEEP

    24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8aJYLTAJ5w:zTvC/MTQYxsWR7aJYwJ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      05b6a5d5670beafdc5e9f6e194b1afe8340447cb9d2943e1e6385e5fb47200dd.exe

    • Size

      1.1MB

    • MD5

      24ab32e79087b3a3977c99fb8a1d8d93

    • SHA1

      89d27447d0d71788b17d85b09301750490224dd4

    • SHA256

      05b6a5d5670beafdc5e9f6e194b1afe8340447cb9d2943e1e6385e5fb47200dd

    • SHA512

      37c07f310478ea2639c322ceaa49a1e3c62afa56191114c8e29ae961f2312f83c66fc7300c803f96a66b8acbdb4644c2f98363cc0a3a04084caeaf804e83c8c2

    • SSDEEP

      24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8aJYLTAJ5w:zTvC/MTQYxsWR7aJYwJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks