General

  • Target

    f78da01163593111a987c0f7c4f275e5e39fadf2a788309e5accec1127486c50

  • Size

    548KB

  • Sample

    240910-c5qa4avbpe

  • MD5

    6c705fa8fe0d80c0a4954c6c8bd3a8d2

  • SHA1

    605679a8f47d0495c0a3e371490bb2074494cc76

  • SHA256

    f78da01163593111a987c0f7c4f275e5e39fadf2a788309e5accec1127486c50

  • SHA512

    f446c79fd9d3223d0443868d428c80958e752702fc7a19f70bf20106d728c95eab57c839c819f71df8e56686b0af72ebeaa3043efb3bb9a7484abe1b551a21ac

  • SSDEEP

    12288:7ROKcbiOX+GdKO2ZQyNXy3LLWXmeuT78POKFGijU4x7dmWR/P88flt3+Ut:sbiA+ux2ZS3LCWeuT78POZQ7IE8+ltBt

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Bank slip.exe

    • Size

      573KB

    • MD5

      910da75d1c40740e17a0ab0b3eb14cf1

    • SHA1

      42461054f817eaa161787deda99bb3455ed959c7

    • SHA256

      815f7166e2d4007e6181aef6e1f7c82a320dfb3b84a610a065db6a3cf8982873

    • SHA512

      491d75253e91e2487e8cfdbd7309fee4a13c5641c7d12d739ee23b16b3b6510bb043a79e2a8bbfcba8716aa7244fa675074973cdf5f72dd8daf837c6a7debe6d

    • SSDEEP

      12288:cXe9PPlowWX0t6mOQwg1Qd15CcYk0We1FxnU4xZdmWx/P8mfVt3D34PIF:5hloDX0XOf4HZI+8QVtz34wF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks