General

  • Target

    K. Taean V31 Vessel's Particulars.docx.exe

  • Size

    1.2MB

  • Sample

    240924-eagrksshqp

  • MD5

    7dc0d41fb18c3933f1a3849621006e86

  • SHA1

    9ddd78acc47770bfb1777a65eb5dad1befedb9e6

  • SHA256

    688f571ea22383cf80540084f6a6e2af098869fac4ab2028f744e262b61dd452

  • SHA512

    0b881a078928214df15047966c706668342d00306a18aaaa577445a547dfdd1335f2344a88899868ec8087c8f85a774d5527d49b1afd2e4e0477a3d5d00c75dc

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaC4Su/Oo+yxoNZ/8N0WCyjMoIG1MS:7JZoQrbTFZY1iaC4ZLxoj8mWCyxIrS

Malware Config

Targets

    • Target

      K. Taean V31 Vessel's Particulars.docx.exe

    • Size

      1.2MB

    • MD5

      7dc0d41fb18c3933f1a3849621006e86

    • SHA1

      9ddd78acc47770bfb1777a65eb5dad1befedb9e6

    • SHA256

      688f571ea22383cf80540084f6a6e2af098869fac4ab2028f744e262b61dd452

    • SHA512

      0b881a078928214df15047966c706668342d00306a18aaaa577445a547dfdd1335f2344a88899868ec8087c8f85a774d5527d49b1afd2e4e0477a3d5d00c75dc

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaC4Su/Oo+yxoNZ/8N0WCyjMoIG1MS:7JZoQrbTFZY1iaC4ZLxoj8mWCyxIrS

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks