General

  • Target

    tmp4rzaoto2

  • Size

    1.1MB

  • Sample

    240918-ebb8gs1dma

  • MD5

    07a958109854778ba3f891872d8d0734

  • SHA1

    4dc9a5067843fccd066bc6de7386760471ce46de

  • SHA256

    3251093aa6fdae864fe5072d57e4b976ae384281f5a6b1e707a15ceb8af152b1

  • SHA512

    f82216eb457b98d0f3c74d3385338e48111a8b701d3a8b69507dab09dfe8a4586f7ff0bea3762da9411f8d31c96bee9d4036aabd55a926b24c58f706bac07039

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaC1jU5S7Ufq510csTteku0mAgI/o:7JZoQrbTFZY1iaCL7Ufqr01teUmAR/o

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      tmp4rzaoto2

    • Size

      1.1MB

    • MD5

      07a958109854778ba3f891872d8d0734

    • SHA1

      4dc9a5067843fccd066bc6de7386760471ce46de

    • SHA256

      3251093aa6fdae864fe5072d57e4b976ae384281f5a6b1e707a15ceb8af152b1

    • SHA512

      f82216eb457b98d0f3c74d3385338e48111a8b701d3a8b69507dab09dfe8a4586f7ff0bea3762da9411f8d31c96bee9d4036aabd55a926b24c58f706bac07039

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaC1jU5S7Ufq510csTteku0mAgI/o:7JZoQrbTFZY1iaCL7Ufqr01teUmAR/o

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks