Resubmissions

25-09-2024 16:27

240925-tydgdsycmd 10

25-09-2024 15:45

240925-s62zaatcqj 10

General

  • Target

    tmpf8bnm6k8

  • Size

    775KB

  • Sample

    240925-s62zaatcqj

  • MD5

    f48f307cead8414f3c2bdb05e9903474

  • SHA1

    bc7972a88115bc42ad66eaff6e30b23f842b6c67

  • SHA256

    ce779c8f6ec2afbaeb75c279873b15c4fd641e5e807975b4e01dcc304ef13b79

  • SHA512

    65b677c35a6cc146d87ba1ec3d9ec55e726aea079e778b1771e3aa464672adfaaaa574be173f43a749b3ad52baae5c463698dc3e9f3136e50693650b840f3ffc

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLDkRl6nUIOcbsEjBTJuqxqLkFA+UBtfvt21sW:tthEVaPqLYT6ueZTgkF2zvkF

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      tmpf8bnm6k8

    • Size

      775KB

    • MD5

      f48f307cead8414f3c2bdb05e9903474

    • SHA1

      bc7972a88115bc42ad66eaff6e30b23f842b6c67

    • SHA256

      ce779c8f6ec2afbaeb75c279873b15c4fd641e5e807975b4e01dcc304ef13b79

    • SHA512

      65b677c35a6cc146d87ba1ec3d9ec55e726aea079e778b1771e3aa464672adfaaaa574be173f43a749b3ad52baae5c463698dc3e9f3136e50693650b840f3ffc

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLDkRl6nUIOcbsEjBTJuqxqLkFA+UBtfvt21sW:tthEVaPqLYT6ueZTgkF2zvkF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks