General

  • Target

    ego.exe

  • Size

    1.1MB

  • Sample

    240924-qgyjfszbpf

  • MD5

    0a81ce0a1b317625cc55e2f68bef7b94

  • SHA1

    63391d5644886111ad206fc0f71974fa2ae79197

  • SHA256

    b5efb5f0b24cb7cd10a6a02d0d0661e9ea277d6997e76691fc6065da23208338

  • SHA512

    23cdd0b77fa9f24ff03d7cf1371de6620a18230901395dcde8b797901b4906985343dfe7c89a8b42ebff91ddcfdae913d1b4112817d30da04dfe0b38fa9664ff

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCJyqWHUztNNa37DBiZ1YTe:7JZoQrbTFZY1iaCiOLard9e

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      ego.exe

    • Size

      1.1MB

    • MD5

      0a81ce0a1b317625cc55e2f68bef7b94

    • SHA1

      63391d5644886111ad206fc0f71974fa2ae79197

    • SHA256

      b5efb5f0b24cb7cd10a6a02d0d0661e9ea277d6997e76691fc6065da23208338

    • SHA512

      23cdd0b77fa9f24ff03d7cf1371de6620a18230901395dcde8b797901b4906985343dfe7c89a8b42ebff91ddcfdae913d1b4112817d30da04dfe0b38fa9664ff

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCJyqWHUztNNa37DBiZ1YTe:7JZoQrbTFZY1iaCiOLard9e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks