General

  • Target

    fc3dfe7f5685cd337382f585ffaf438256722a15303a86cac63d739a082ae3d5

  • Size

    636KB

  • Sample

    240803-bxlr9sydjm

  • MD5

    9b1f3f664b27bdcd30e4992fb0740c75

  • SHA1

    2f8f726cae1c784bad1f72314ac3c3584203ea92

  • SHA256

    fc3dfe7f5685cd337382f585ffaf438256722a15303a86cac63d739a082ae3d5

  • SHA512

    6c2bd271eb01fba7cb5f6989f9b6fee997cc9bef1c7960933742ff2f9df078728e865041923b679be30d36fa05b95f9f9a4ea7cbaa443adb4ababfb693bab6cf

  • SSDEEP

    12288:zrDNzNooy/+6Q97fX5LUTQH0OYqTOsiE7Vrq9UIOkkEetJ7mBQGiek2:zrpzyQVRHHNYYiGV3RRLtJ7mBQyk2

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Payment advice.exe

    • Size

      1.1MB

    • MD5

      bc7f5a3ffe1b7377b53f4d3682514224

    • SHA1

      5b86b7ce857b243b96c8344d1357ad5cf1a94cfc

    • SHA256

      fb04094c609fd7ab6e1130443f44d7fb62c5b565a4a8a806413e1e74ba1bf3c1

    • SHA512

      09ba951b07eb916aae012e587a5ceceda763b301096a55b34b837d42f0d38044e0895bfb9d93828cf6979ee34c7927f2adc477a4f0e2284e49501bca25eda483

    • SSDEEP

      24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8aZFFhb7mZQMy:yTvC/MTQYxsWR7aZtb7mz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks