General

  • Target

    f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f.exe

  • Size

    1.3MB

  • Sample

    241009-c43vssvhrn

  • MD5

    14a18fb3ad6f796e93c8aa1e9c7f34f6

  • SHA1

    9b5cb8fae133d1033816260815061699d54c082a

  • SHA256

    f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f

  • SHA512

    ab1d08792a0aafad461c4b44e7f0f167a5d6a142be7f4497f47a003b8b3e08f76b257fd73a918619a3af969e57b7f56381d086cae91e6111f0699cee0bbbb33b

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaClwbmA2JR50tFQyuiBjXaSg14r9c86O1dPr:7JZoQrbTFZY1iaClVdytG4ZbhKW

Malware Config

Targets

    • Target

      f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f.exe

    • Size

      1.3MB

    • MD5

      14a18fb3ad6f796e93c8aa1e9c7f34f6

    • SHA1

      9b5cb8fae133d1033816260815061699d54c082a

    • SHA256

      f89e6918fbd3ccf0e58a7165c916b465f5d008bb8eb1d21d98f6d3144e86c40f

    • SHA512

      ab1d08792a0aafad461c4b44e7f0f167a5d6a142be7f4497f47a003b8b3e08f76b257fd73a918619a3af969e57b7f56381d086cae91e6111f0699cee0bbbb33b

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaClwbmA2JR50tFQyuiBjXaSg14r9c86O1dPr:7JZoQrbTFZY1iaClVdytG4ZbhKW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks