General

  • Target

    637414a62cd73dd2f7abd3c0de5232cd9f3a94d5661986abd24a78aaa69327ea

  • Size

    811KB

  • Sample

    240923-sqwsbszdnj

  • MD5

    8635ed28863d14659a15e019aaec6178

  • SHA1

    4716010f8239e11050bd228043f3d2b8f03aaebe

  • SHA256

    637414a62cd73dd2f7abd3c0de5232cd9f3a94d5661986abd24a78aaa69327ea

  • SHA512

    fd14d6ed7d5ca574eda95aeab306dd3f8b02730d2fa252988a7e5d57eb4fb8b580bf9479266ea94d141203bf6a91b89020ffc4b0f92c7b6ec19b5c5534aa0b4f

  • SSDEEP

    24576:XY7tC/D80olUcTiRtS5OHbmWqre/obnFr5CHm:XYpi80olUcTiRtS5+mFieNCG

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Order enquiry 2025.exe

    • Size

      1.1MB

    • MD5

      10b87f0207d77ab042cbae6f9fe7f4fd

    • SHA1

      d3d16ac8ad828685aa4caf7369590206338748a5

    • SHA256

      4997746df04ba00d80f001da1d5f984b773b82f3643ca0eee98d3ef1570f403c

    • SHA512

      a460ba25b69e0675acf91908490382f69c948f3f4e5612f90f0433864c948a555d4b263b87f9f47e0cd6c2714f2ee0f5c7ba35e73979daab97c68e94be70462e

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCKy1OTbYW8r8Tajn9rZI4S:7JZoQrbTFZY1iaCKy1WYTooVIp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks