General

  • Target

    d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d.exe

  • Size

    551KB

  • Sample

    240906-b8a5xazblj

  • MD5

    235fd45bf6dbc62b5310a71e761ee5a6

  • SHA1

    3ffdfbd18c6259fbc62c3cdc1f82977f9808143a

  • SHA256

    d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d

  • SHA512

    ed7b8ec2019001dfc16ab8161579104cb0d7adf7795507d23d0ddd3a0b455b46d7844e30e56bdf07567c7bff0be124b4d4ad93ad7310bc6c1817b28b3c417d82

  • SSDEEP

    12288:3YV6MorX7qzuC3QHO9FQVHPF51jgc322X3x+XorsE5hl7qS:EBXu9HGaVH35X34pE5hlR

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d.exe

    • Size

      551KB

    • MD5

      235fd45bf6dbc62b5310a71e761ee5a6

    • SHA1

      3ffdfbd18c6259fbc62c3cdc1f82977f9808143a

    • SHA256

      d3956670c2fb4ab0739bff8f47efc5f6accc848960a9ec11e8bb1849dfc8a59d

    • SHA512

      ed7b8ec2019001dfc16ab8161579104cb0d7adf7795507d23d0ddd3a0b455b46d7844e30e56bdf07567c7bff0be124b4d4ad93ad7310bc6c1817b28b3c417d82

    • SSDEEP

      12288:3YV6MorX7qzuC3QHO9FQVHPF51jgc322X3x+XorsE5hl7qS:EBXu9HGaVH35X34pE5hlR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks