General

  • Target

    24082024_0156_23082024_EV 4880 AF 271075403.zip

  • Size

    663KB

  • Sample

    240824-ccvp4s1gnp

  • MD5

    3fe4be4772a6c9e117c3d66c9915b33e

  • SHA1

    e8b034da9b3f6d7af2165a20d77d8411ea22a4ea

  • SHA256

    35ad60072a4bee41fee93ee3b1d0725fc8eeef388bdbba755d9944b8115ab805

  • SHA512

    67506babf9969706b0dc4367ed165200481b28faec6950b824dbbe89be0aeb489631b252e49e681580c599ae8b50581291e75c64a7a52250db7a3be3ca84b079

  • SSDEEP

    12288:T4ESMB+hb6goyodG4kmveCR4UMV2O9bqUq1b1yvD6Wkwyj+n8L:T4D5eg1eBkmGCuCO9+UqTyb3k1+6

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      enyioma.exe

    • Size

      1.1MB

    • MD5

      462dc62ec8cf0582b45cca66c0d16eb6

    • SHA1

      6725468bb6b388ae894cb6c168621f970398ae5f

    • SHA256

      b24e9e338775a89120c668c30ac6c6f2064160e9442988f8e8ea807d7d309a2e

    • SHA512

      c8027f3d7b6c3a86e2ad265fd7cf501266b42c6b46f9704942b85a130975a8fb546ab3b51ae00db77d3a3be290ac672fc86b89e86d40d5bcb3a0e378b72aa98b

    • SSDEEP

      24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aye+qV6zLkRh:4TvC/MTQYxsWR7aye+CSLk

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks