General

  • Target

    Order enquiry 2025.exe

  • Size

    1.2MB

  • Sample

    240924-p8m2csyhjf

  • MD5

    99d60ef6caf5a18402bb86921dea79a4

  • SHA1

    a72a402f680e4865472327f50d420c90ac2331fb

  • SHA256

    a60bf25d5fe0114b515c2989851b95ca25e1fd474f83b640fac77bba2b80834a

  • SHA512

    f18ff81d20795916f0ec1588c6faf1d5a9f6a9659520676a589f1258224b8e35c490006aae45253afe30adbf263db6108f10616258f1fa4c9dec56783d30aeac

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCpAKm5rZx1Ql3jhOoRU/oTahB:7JZoQrbTFZY1iaCpAKm5lxs3jhOoRcoq

Malware Config

Targets

    • Target

      Order enquiry 2025.exe

    • Size

      1.2MB

    • MD5

      99d60ef6caf5a18402bb86921dea79a4

    • SHA1

      a72a402f680e4865472327f50d420c90ac2331fb

    • SHA256

      a60bf25d5fe0114b515c2989851b95ca25e1fd474f83b640fac77bba2b80834a

    • SHA512

      f18ff81d20795916f0ec1588c6faf1d5a9f6a9659520676a589f1258224b8e35c490006aae45253afe30adbf263db6108f10616258f1fa4c9dec56783d30aeac

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCpAKm5rZx1Ql3jhOoRU/oTahB:7JZoQrbTFZY1iaCpAKm5lxs3jhOoRcoq

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks