General

  • Target

    1a0c97c25e5ff8c862717d45f566659b76014262e3f8aa2867683f6f62af9be0.exe

  • Size

    1.2MB

  • Sample

    240830-bkvjmszekh

  • MD5

    2884d53826b824a28cfbc4ebefabf549

  • SHA1

    6968dbd0d1cedf3bdba126eb784974cbc0e4d2bd

  • SHA256

    1a0c97c25e5ff8c862717d45f566659b76014262e3f8aa2867683f6f62af9be0

  • SHA512

    3e6e5de3b0b36f4d3ca4a33193077706038d1bbaeb6fb1a0a6c4a40af501b814ce261a0f7fc4ac321680bc615eda459b09f4540f47a8ecec2fe2e8af2c04ff80

  • SSDEEP

    24576:ZZj9DS5AM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhs:ZZ4Mw7nx

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1a0c97c25e5ff8c862717d45f566659b76014262e3f8aa2867683f6f62af9be0.exe

    • Size

      1.2MB

    • MD5

      2884d53826b824a28cfbc4ebefabf549

    • SHA1

      6968dbd0d1cedf3bdba126eb784974cbc0e4d2bd

    • SHA256

      1a0c97c25e5ff8c862717d45f566659b76014262e3f8aa2867683f6f62af9be0

    • SHA512

      3e6e5de3b0b36f4d3ca4a33193077706038d1bbaeb6fb1a0a6c4a40af501b814ce261a0f7fc4ac321680bc615eda459b09f4540f47a8ecec2fe2e8af2c04ff80

    • SSDEEP

      24576:ZZj9DS5AM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhs:ZZ4Mw7nx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks