General

  • Target

    c4c4631fef934697b3dc440a5de2292d.bin

  • Size

    641KB

  • Sample

    240901-b7jewsybmh

  • MD5

    1b51dca73b39ab74031be2ecd91d449a

  • SHA1

    16de0f36c3ab62888b6137c06ed3c149d63d5e52

  • SHA256

    9e5300e3ee2395a6e05f19532b1471bf814f2971909c12b84415c4ff2e35d630

  • SHA512

    49ef26c90f19154ab3bbea7e4a08e2e116ed1499ab0bd2d499b2a0e0308cf97b0b3cd07b6801e7d6773258cba51fd07912ead484c495f1109d0bc5b5e962bd8d

  • SSDEEP

    12288:RErXk5NYjJs9QZKux1QxfC6bd63SBAFhIQplavMDrL8sfXf:jNeuuKux1uCkdeSBAFhIUlav+82P

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      0a5816f1e55e810043fd6ac8a6d28eabd755696e76cf1b96d9fc3680c8af6177.exe

    • Size

      1.1MB

    • MD5

      c4c4631fef934697b3dc440a5de2292d

    • SHA1

      4312088d769c9a86759734b2da54a1a08a5d2c73

    • SHA256

      0a5816f1e55e810043fd6ac8a6d28eabd755696e76cf1b96d9fc3680c8af6177

    • SHA512

      9c1c1d6216ea8c15cd4cfecf44a36759252b4e32baa63e7b02e799218ad3c5835093c9dd14e54fe1118425398abcb5343d8b106c82eef705eaf0202cadae5b6f

    • SSDEEP

      24576:JqDEvCTbMWu7rQYlBQcBiT6rprG8abRpfTr/:JTvC/MTQYxsWR7ab

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks