General

  • Target

    b36be049cc3924ab4e57a27c2fef33149dbb5ed5df907f0ca665c685fe5ad15e

  • Size

    848KB

  • Sample

    240925-e3nqlavfnj

  • MD5

    08b938525e6a8d3f9d5ac6d8c91e588c

  • SHA1

    0780678587c6702474edccfd87be445ec943a6a3

  • SHA256

    b36be049cc3924ab4e57a27c2fef33149dbb5ed5df907f0ca665c685fe5ad15e

  • SHA512

    424ae685d604d0ab209f68599eb09c9e136e071ae47eb56de0a98f75e4b564e280b1ac9c94e971d9c09fc4f3746811b05265e3eaad88ef4d8e2604314065e103

  • SSDEEP

    24576:DzaqtRE5KkvYxlCg2vj8wpLQIUgJHIU1j:PDWKkwxlCgcj3LQlJUp

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exe

    • Size

      1.1MB

    • MD5

      7b29104168610875dc525f1939c1be9d

    • SHA1

      a35013b158fae14b83e1596098a032f70114d0df

    • SHA256

      f04633dabb4fbf66d38cc86181f7770d44910073d4866acd15ae29f96edf4863

    • SHA512

      bd13dc4b52f4c612ce8b07971952156bae9631f47d82cc3e619ca37bbdfbe89489fab78855437926b3c233c92b11cf9bc7f39a4d81ea030d801aec6f637d063c

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCPl+2KvjAwpNksq2JH28O4:7JZoQrbTFZY1iaCPl+2Qj7Nk9h89

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks