General

  • Target

    MV TASOS Vessel's Details.docx.exe

  • Size

    1.3MB

  • Sample

    240930-eegx5swgmk

  • MD5

    f3dde6c8bc9bfb2c6ade147f57072fd8

  • SHA1

    20806b6ab0070ed41d131b699c75b652557b860e

  • SHA256

    51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9

  • SHA512

    58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH

Malware Config

Targets

    • Target

      MV TASOS Vessel's Details.docx.exe

    • Size

      1.3MB

    • MD5

      f3dde6c8bc9bfb2c6ade147f57072fd8

    • SHA1

      20806b6ab0070ed41d131b699c75b652557b860e

    • SHA256

      51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9

    • SHA512

      58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks