General

  • Target

    f1524c285f261aa6f27649e93e175af037f13f043220fa5067ea8fbd9f18de88

  • Size

    24KB

  • Sample

    241017-bv46tsvcpf

  • MD5

    f8fa0d36704535d59d6e59fddee92d78

  • SHA1

    0b87c985a181afdf8d4c51bd0912654e1f77ab70

  • SHA256

    f1524c285f261aa6f27649e93e175af037f13f043220fa5067ea8fbd9f18de88

  • SHA512

    102369be251c909458e2175e7f726a6a4211a8bb5918e548c8ab3bedb0491c260956111e39c66d55612dd2d472eedf31f280b3cfa5260fafa51bf3036c1ca64b

  • SSDEEP

    768:WerqV12hA6Uhk/nFzWKI+WfTm/1NSxd/AqO:Zrq89JvBW4DsQ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Ref#1605338.exe

    • Size

      116KB

    • MD5

      2b1db5315348f2450af136754ebbb7fd

    • SHA1

      153b2c05fdf35b77f2fb913ef6f504abc56a6d2b

    • SHA256

      76c32944e75b71da837b7b0b2e434aead9af0a352204979b5f7ab7112f378b49

    • SHA512

      8eee7d9a5364ef00698c5b2896fd5211eb5087f313a3e9907d7f980311a786423a4224fc69c163e96feb94208799bdf8cc804661ae8f984d226a6d335dc873f9

    • SSDEEP

      1536:9Ss1SilfYfSqfIpxUhWJ7JGabSvadnbulIpJ5hmJ:kilzpRJdGLadnbulIpJ5hC

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks