General

  • Target

    C0R567842T257642523.eml

  • Size

    1.2MB

  • Sample

    241014-hdqqfa1elg

  • MD5

    cddd2a140ac0a97c4d97e1cd9961104a

  • SHA1

    e5ef5213191032af6db61a7f88c0147327b6b0d1

  • SHA256

    54aceb40ff0dae08e2530d3d4bce7cfc94f06aff080c986c3eedc3f7655014ef

  • SHA512

    6199136df432952271e289bddaa60d312c0a90ae7a78d18d920353cbab5d27912d5c0140ea1631668947286b3e18e23e567d9bce972158f5d0083d65e3234830

  • SSDEEP

    24576:BOLKGKIMWRXwsYf+RdAXeQxXVWU6xvYM5Z05OEXvjT:Q2GaylYheBLu7T

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      AWB _Ref#5800028900pdf.exe

    • Size

      1.1MB

    • MD5

      bde744fbe419f73f9b44fc0570c233f4

    • SHA1

      f7b987ce8d3e4e1f1bfc7819c70ffefcb158fd2c

    • SHA256

      586008861c32e8f32bb841b3734614ca385ba4c554a976ce9074a27d0df5e784

    • SHA512

      5fcafd65d155abb11fbc84c10fea30afe190c89ef7b806654887b8594d1c6793b017902a0f479ed03968e4003af71edb2f33df9073406bbdde3519fa1dc75a75

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLnX89AOLbz+kbn/y3B:f3v+7/5QLsO8bSt3B

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks