General

  • Target

    75b653491db31cbd74319e4931c3c7939dd9af965cbeb8c5d454c7b5983300e8

  • Size

    548KB

  • Sample

    240910-jbtjzssckp

  • MD5

    7f8b5f195a8380339aea46210595d317

  • SHA1

    6b55c94af575a7569819d975c74fc5167dd3337d

  • SHA256

    75b653491db31cbd74319e4931c3c7939dd9af965cbeb8c5d454c7b5983300e8

  • SHA512

    980179293d0c09d90aa0bef50c2945fb004b186fbe7a56184313b20431f334ca2c93109939d8023091db265b031fad773f4d27993b96d3182e89b602a36fe9f8

  • SSDEEP

    12288:7ROKcbiOX+GdKO2ZQyNXy3LLWXmeuT78POKFGijU4x7dmWR/P88flt3+Ud:sbiA+ux2ZS3LCWeuT78POZQ7IE8+ltBd

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Remittance advice.exe

    • Size

      573KB

    • MD5

      910da75d1c40740e17a0ab0b3eb14cf1

    • SHA1

      42461054f817eaa161787deda99bb3455ed959c7

    • SHA256

      815f7166e2d4007e6181aef6e1f7c82a320dfb3b84a610a065db6a3cf8982873

    • SHA512

      491d75253e91e2487e8cfdbd7309fee4a13c5641c7d12d739ee23b16b3b6510bb043a79e2a8bbfcba8716aa7244fa675074973cdf5f72dd8daf837c6a7debe6d

    • SSDEEP

      12288:cXe9PPlowWX0t6mOQwg1Qd15CcYk0We1FxnU4xZdmWx/P8mfVt3D34PIF:5hloDX0XOf4HZI+8QVtz34wF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks