General

  • Target

    30082024_0200_28082024_Electro-08282024.7z

  • Size

    697KB

  • Sample

    240830-cfe4tssajc

  • MD5

    93944b06a379e54c588ce5f17f928f7a

  • SHA1

    08287a75150bed81469e3f8176cae5cfd61ad0a6

  • SHA256

    a9728615030bd131152dc0898470f5ddfd792ae459f56974be09f103c616e6fd

  • SHA512

    fa3a27705a89099f401621ed07437185d9eeee37d5dc72303b59596dfdc5c2fc2c01c17f4c074ad7592601cd3dd5846c7299afb0874c3b6df85d36fda1ab0cda

  • SSDEEP

    12288:Q13iGyRfVXK3iTE+LOqnIGOTcuJYcTP8YSDObGjs9q7Vh0qIqsTbpqdyTP0OHta8:Q1qjK3MJlvOTjJHTLGssX0qLwsaczkzT

Malware Config

Targets

    • Target

      Electro-08282024.exe

    • Size

      1.2MB

    • MD5

      9d3827e8622b4221588f60a3273cb725

    • SHA1

      1f1521c7c0d0f999d1afa921036082729fdb9261

    • SHA256

      cec92fba69ba56563b3e84ed87291bfb50a85a6e44b6a9b5cd698c00c380e0f0

    • SHA512

      661900d0386cee1af5806a6ad274f2f7dfe3d4624bf065814a509b84d1ed905c86449a64b879d3283dedb9b88d4189423e30f967e9f268c6e8094b35eb0cca51

    • SSDEEP

      24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8aF7wVq+wnazZkzFdd:8TvC/MTQYxsWR7aFAVlkzj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks