General

  • Target

    7df729859c228320bad86d56619699472112fcdab2099c720771a9b24d2a76b7

  • Size

    620KB

  • Sample

    240829-pav93szhra

  • MD5

    13eb873c3deb96c6f203471ae34333cb

  • SHA1

    61ef1250d4a0299cdf7ebc32ccc46ba0fd15e8ee

  • SHA256

    7df729859c228320bad86d56619699472112fcdab2099c720771a9b24d2a76b7

  • SHA512

    12d74835fd1f38313ae9721581bb7e88bf7de82813938d8e867948c6756c2284d5c0f2d318e36a4b1664686b0c296088a0cacc815228f99b1426b3e28215ab44

  • SSDEEP

    12288:C41+B+6EJV2a+QoAdXm3BA1joiJhDmJSp6RCeyi7tEH38utrORSkV3wcvRA0:X31Ya9dXm36VKJq6RCeyiRbhS2R

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Balance payment.exe

    • Size

      1.2MB

    • MD5

      2a9d09fc65e58d1589d0d10eb43c094a

    • SHA1

      411e29bdd4bf197ad7a44d4c675e0c0dd78538dd

    • SHA256

      0fc79caa00d59d4864ef9d4218cf238e52ae8208906c8e4d0a5d8e81c3607eb4

    • SHA512

      b67e6fb8a2a8d521ba395b8596c2d46212e631d1e04ccc0e67a0a50d6bd42943d1ff2b1aa9a4f317a1cc4fadfa930c80c4b88f97d484cd5ef0b6d3b82a4bd820

    • SSDEEP

      24576:YB6iYOAM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhV0:YBDMw8LrMx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks