General

  • Target

    4cc75408fbdea5b473d2b825a5b975e173747657dede06e51ee5d61aba6f0a7b

  • Size

    705KB

  • Sample

    240727-mj4lpsxdnc

  • MD5

    f59a285d2a3159f567d70e8fd0961c35

  • SHA1

    00dd28a6d3dd3c0d9405bc0ed48ba38450c876a2

  • SHA256

    4cc75408fbdea5b473d2b825a5b975e173747657dede06e51ee5d61aba6f0a7b

  • SHA512

    b099892deeed4d875a32fc64454db3306039938e7befafe922ff14d6450d9986af686f7ea5d230b288e153e039e44aec9e786d3c681c8bfe1ee8c1d31f40deb0

  • SSDEEP

    12288:XMXAR4hMhKsfDKai65bxxGl0WblbQu+gX2ZvxLXoBfYBObZhvNmqyEybGrG2:XMXAR4ShKGHi65vxylbQuj2Zv9YBfYBQ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      eb89a7b195591d21c6f902d02560d4b2d1d1837fd94d404c3211e9f4ae12444d.exe

    • Size

      1.2MB

    • MD5

      526951b8056a2710c76cf0a533525dac

    • SHA1

      65293f6a7d9e556403fdf1404913c0c57bb363e1

    • SHA256

      eb89a7b195591d21c6f902d02560d4b2d1d1837fd94d404c3211e9f4ae12444d

    • SHA512

      6b74c10ee5c9f83016e97a17c4b132a77df978017f8fd8a118cd63faa759f65de12db68b6916886c72681e5f7bdaf67ae173b19a45ab1555704e750c883b5447

    • SSDEEP

      24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8a/6nnjqKoep0fWFi1EgLQ:oTvC/MTQYxsWR7aKjqKoepBi1lL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks