General

  • Target

    680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a.exe

  • Size

    1.2MB

  • Sample

    241016-b99d4axake

  • MD5

    8f8efad685362993d81ff8a2316e545b

  • SHA1

    06004934a883422e375886bf537fdb8e13300071

  • SHA256

    680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a

  • SHA512

    28a29bdd536acc34d262843486ccb27d01bb90866a4c517df5ff3d3a320aec1c5605508cf0cdbe3af34626af1178dd1733a159de2385684989c73d4d4b98aa83

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLbj6ngZtjU61JzjPyHGLXZndu1Cu7:f3v+7/5QLbj66tjUO/Pym7ZGv

Malware Config

Targets

    • Target

      680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a.exe

    • Size

      1.2MB

    • MD5

      8f8efad685362993d81ff8a2316e545b

    • SHA1

      06004934a883422e375886bf537fdb8e13300071

    • SHA256

      680053fa589159be381eefbb2dc016960a91beefe3d976e742000008be43067a

    • SHA512

      28a29bdd536acc34d262843486ccb27d01bb90866a4c517df5ff3d3a320aec1c5605508cf0cdbe3af34626af1178dd1733a159de2385684989c73d4d4b98aa83

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QLbj6ngZtjU61JzjPyHGLXZndu1Cu7:f3v+7/5QLbj66tjUO/Pym7ZGv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks