General

  • Target

    PO-A1702108.exe

  • Size

    1.2MB

  • Sample

    240924-pk9kfsvcmj

  • MD5

    514233f0589be5d977a1ee164fe8db1d

  • SHA1

    bf713daec188be3a005e1a2097b4f5cb68ccc222

  • SHA256

    6abd474c86db77c6943522762f5658eb58c523bb84d68fcc6495a2cbbff72e9e

  • SHA512

    6f5b4d6175b593e2d287d25369dfdbba7bca44ea487ad7e7d39628670480eb63f8795f6ef56478d215b5f05ef76d74af26fe184d2d434416b657d1ba694b3261

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCbLRWEjIQeK88hCPbkfX6Jp:7JZoQrbTFZY1iaCbNkQN8SPap

Malware Config

Targets

    • Target

      PO-A1702108.exe

    • Size

      1.2MB

    • MD5

      514233f0589be5d977a1ee164fe8db1d

    • SHA1

      bf713daec188be3a005e1a2097b4f5cb68ccc222

    • SHA256

      6abd474c86db77c6943522762f5658eb58c523bb84d68fcc6495a2cbbff72e9e

    • SHA512

      6f5b4d6175b593e2d287d25369dfdbba7bca44ea487ad7e7d39628670480eb63f8795f6ef56478d215b5f05ef76d74af26fe184d2d434416b657d1ba694b3261

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCbLRWEjIQeK88hCPbkfX6Jp:7JZoQrbTFZY1iaCbNkQN8SPap

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks