General

  • Target

    14102024_1646_13102024_AWB _Ref#5800028900pdf.gz

  • Size

    791KB

  • Sample

    241014-vaevzsvfmg

  • MD5

    fef7ade67cf3a2003cbda1ccb1ee61ee

  • SHA1

    42b99e0cb0c5da3bdd0fd72e7297977f8668d3c8

  • SHA256

    2f19734e2830cc758cbdb51029bef396a0428b26c85128bc56376262f549ad0b

  • SHA512

    9026be514f34884f142b7c62037dc99e77331165a61f1cac126050b4d8be17ac7f50ab37a992930abafd58be5472383c571018bf848a7d3d860bac00a41f8883

  • SSDEEP

    12288:lx5nkLeffJWHQb3/LUYAkNTBuBZRMPBJNm9Crf8OLbm4ae6cFwIAQHdzh/yhBvv:lxC6JWwL5TWrMLNiCL8OLbZaOFXRyfn

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      AWB _Ref#5800028900pdf.exe

    • Size

      1.1MB

    • MD5

      bde744fbe419f73f9b44fc0570c233f4

    • SHA1

      f7b987ce8d3e4e1f1bfc7819c70ffefcb158fd2c

    • SHA256

      586008861c32e8f32bb841b3734614ca385ba4c554a976ce9074a27d0df5e784

    • SHA512

      5fcafd65d155abb11fbc84c10fea30afe190c89ef7b806654887b8594d1c6793b017902a0f479ed03968e4003af71edb2f33df9073406bbdde3519fa1dc75a75

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLnX89AOLbz+kbn/y3B:f3v+7/5QLsO8bSt3B

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks