General

  • Target

    3f3d26e4222fe2207b6588eb3672db62c595f20d0e81a18acdb85afb5a30dbfa.7z

  • Size

    561KB

  • Sample

    240830-bp9jcssakp

  • MD5

    19de96f412a3f3498b8bba389399f812

  • SHA1

    d9d8c7f5f30c98bd4bd56745b0666e12661dad5c

  • SHA256

    3f3d26e4222fe2207b6588eb3672db62c595f20d0e81a18acdb85afb5a30dbfa

  • SHA512

    b628a9b2781f51ad9647476e0be27fb357ca5b9174296316689134eb4e2d3336399d7352f365f048778170332638dd02df640f035dd91dbe1cada6c9b852e3de

  • SSDEEP

    12288:K/4gxlPOP24AQoPK4ADZlxF3dTduhDJ//StF43kSUNaX2tNiKTLX0Dc+L:K/BxlPOe4ZZ7F3dTURJ//EOVUNQWXQcY

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Great Wall Motor Sale Bank_Sift_Copy.Pdf.exe

    • Size

      1.2MB

    • MD5

      2884d53826b824a28cfbc4ebefabf549

    • SHA1

      6968dbd0d1cedf3bdba126eb784974cbc0e4d2bd

    • SHA256

      1a0c97c25e5ff8c862717d45f566659b76014262e3f8aa2867683f6f62af9be0

    • SHA512

      3e6e5de3b0b36f4d3ca4a33193077706038d1bbaeb6fb1a0a6c4a40af501b814ce261a0f7fc4ac321680bc615eda459b09f4540f47a8ecec2fe2e8af2c04ff80

    • SSDEEP

      24576:ZZj9DS5AM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhs:ZZ4Mw7nx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks