General

  • Target

    01092024_0051_30082024_PO-5490845-4S8068290.xlam

  • Size

    682KB

  • Sample

    240901-a7w6bavfrk

  • MD5

    76c282413a8c6edbf4a47919562a01ca

  • SHA1

    7d7438892ef62c343b1b1740366ec7f60b600bf9

  • SHA256

    e07d367746bd1758ff371cafef3dca07c54658c56c44597e425b9a95e8baf87a

  • SHA512

    844b59bed86aa7d40cc306b3af5f0d3cf4207ac5f7cb074d4ef4c21da992530d02e103535595caa5d2ef5fe1dfc30c86ff6b9ead9ffbb136495ea9b35f24675e

  • SSDEEP

    12288:h0Vb6zt3J9Lsd3/BxXXsmSGQ0TkHsJ5T+fVtXx4c7KL6cA39hkg:yVb6zRJ9Lsd3bXXXkMJ5T+fbXKc7Y6xH

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      01092024_0051_30082024_PO-5490845-4S8068290.xlam

    • Size

      682KB

    • MD5

      76c282413a8c6edbf4a47919562a01ca

    • SHA1

      7d7438892ef62c343b1b1740366ec7f60b600bf9

    • SHA256

      e07d367746bd1758ff371cafef3dca07c54658c56c44597e425b9a95e8baf87a

    • SHA512

      844b59bed86aa7d40cc306b3af5f0d3cf4207ac5f7cb074d4ef4c21da992530d02e103535595caa5d2ef5fe1dfc30c86ff6b9ead9ffbb136495ea9b35f24675e

    • SSDEEP

      12288:h0Vb6zt3J9Lsd3/BxXXsmSGQ0TkHsJ5T+fVtXx4c7KL6cA39hkg:yVb6zRJ9Lsd3bXXXkMJ5T+fbXKc7Y6xH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks