General

  • Target

    c6f2702a907035df9c340c5651c14060ae6d45e7813035ae695cbef4c7af2212

  • Size

    610KB

  • Sample

    240904-r9gl3ssdql

  • MD5

    c0f38e20a223c01e56a4c5b7328dd31c

  • SHA1

    9beb66d7f0641e628d1c96e3c95ce9f164ede4e2

  • SHA256

    c6f2702a907035df9c340c5651c14060ae6d45e7813035ae695cbef4c7af2212

  • SHA512

    106f2f9ec47dc27609d2a9a6dc06a41596e9edb358964cb087111a4bc845efcbfe646699c0b3c1d0efd45936f206b43180640544d7c714c871d0d000b11fe00e

  • SSDEEP

    12288:bZZfWMyzD0tI0yFRfWYYruyTrGzAAT8bQ/m94ZlYFbZTnJwHZJrFLjWWil9br:n230a0yFRfXGTq08hlY7TnqjrFWp9/

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      81bd5aa262413bbd33634493f9df78ef8293fc704adb1a7bf121f31b6b939cb9.exe

    • Size

      1014KB

    • MD5

      2e104c0bf13525c4f527f1e95bf18699

    • SHA1

      6b9827d8313d1840465dc6403e0975e688e3b3df

    • SHA256

      81bd5aa262413bbd33634493f9df78ef8293fc704adb1a7bf121f31b6b939cb9

    • SHA512

      3963d8e1a175160930ef62b04bec14b5e3e0d1cb0f4d6c58eae79d74b9d3393f72bf5456dfa763698a9794e6728b34a5b7ad09a33cef2d4c87bc26d109864557

    • SSDEEP

      24576:MAHnh+eWsN3skA4RV1Hom2KXMmHaUiiY0BJqS1j5:rh+ZkldoPK8YaUq03

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks