General

  • Target

    a6ae703da8eab0f1d26f7819d16202a17a000c342c4b3dc0cd11d535b5b50511.zip

  • Size

    700KB

  • Sample

    241013-2rz1tascmh

  • MD5

    01b157a247cb914c6d55c62c10051621

  • SHA1

    2613cbbef65241187234c1f240b704de0dd4de62

  • SHA256

    98a045e147fe747d1d3932d6e5908019f3386767548e5be7c057e261d2e75f20

  • SHA512

    e5fc6d6b7ca0cbced07043d805ffb5249ceb5167bf0f565d6ffe6c26fd4496c4ba25f10345ff9e33bc69ea3d52661d624e2d4530be65568f989e0ea380d029a7

  • SSDEEP

    12288:szAj18DGNOBN0t3RZtQMom6OvNsB6JEsaq/bDrj3JE8X/byjQJHLyPtqBG2CVAS:v8DGyNe9D76aYsBV/Dz/jUQJH6d/

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      a6ae703da8eab0f1d26f7819d16202a17a000c342c4b3dc0cd11d535b5b50511.exe

    • Size

      915KB

    • MD5

      2b8caa685c7fc7b1d39fa3eeee7c15a5

    • SHA1

      faa007566a0aa7c89155a2153545af43c073651d

    • SHA256

      a6ae703da8eab0f1d26f7819d16202a17a000c342c4b3dc0cd11d535b5b50511

    • SHA512

      b85f5dac1d974c424ddf49982dc05acb85b1ce8c75d9b4cdb1a631b92beb55fe9046424e15b201a0f3f7bd0305df2599284115e4368508b2b155b13b62e6dad1

    • SSDEEP

      24576:00NwSIOU6QJKm4+a1qalZdvf6mNdxF3NxwZpzjo:hySO67Pqa5vdSpzs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks