General

  • Target

    d32a5c5eb5d8662968a19211c7a8eb39d600bf1562cc6aa9dba0f7d6b0eb2fbe

  • Size

    840KB

  • Sample

    240923-gpjwlaxhkk

  • MD5

    a725491288d92b0a51cdd34aedd8b2ce

  • SHA1

    8ce3b8fb443574811bb5154c5a39f6208feb29b8

  • SHA256

    d32a5c5eb5d8662968a19211c7a8eb39d600bf1562cc6aa9dba0f7d6b0eb2fbe

  • SHA512

    ecd3ba07333ad6884f46ad50b7d4966cae8bbfacbdec434c94d014f9b1dad52ddea8d6d8b7a0540c2c4bc20d4b92d9683d50a0ea918b6dc55925432ebbdaf975

  • SSDEEP

    24576:rzFh6Ax5KkdYBlfjkbxgyostXQS6SFr2L7:XFh6MKkWLGR6z

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Halk Bank.exe

    • Size

      1.1MB

    • MD5

      9d89bf38f44abe7199f4b7e34cebc254

    • SHA1

      eb48fb2f074aae30481beac7867794eb62cc383e

    • SHA256

      516b4492c4c76ba5d22f4e3867184816033a72712f7348f3d00d7903533fd7a3

    • SHA512

      345ac5d5b303253a2b42a366b9ece2fd0d5617bb6bd6b8cc4e26d4b9ffb5768d048c46723f35e0cd8dcd2bde3832245f515636b3d3b638aeba76d4332f743ddf

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCkGI07jkbxayssxXQo60Hr8L1:7JZoQrbTFZY1iaCBvnGLmh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks