General

  • Target

    f17a45c8b3ac9adf1a66dfa1b27e62e433adfaabcd36ba52deac1e7c00699f47

  • Size

    1.5MB

  • Sample

    241101-tt5p3sshmp

  • MD5

    0a3235126ffdfe6e847946d2eb23c03e

  • SHA1

    2a00f21b2d1adc51c3fd9c39054317c6d88f349d

  • SHA256

    f17a45c8b3ac9adf1a66dfa1b27e62e433adfaabcd36ba52deac1e7c00699f47

  • SHA512

    b642e1be2a26ee20ee8d859535a6afe04640f707090461764f7b563ab6d12bb36bd78b44d0462bfde4271e2c6031124d31595358382d56c679077774072259d9

  • SSDEEP

    12288:m2T93/oterg2+h1QQEroi+YoaUqd+u/2f:P372EMj6Uqd+u+

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      f17a45c8b3ac9adf1a66dfa1b27e62e433adfaabcd36ba52deac1e7c00699f47

    • Size

      1.5MB

    • MD5

      0a3235126ffdfe6e847946d2eb23c03e

    • SHA1

      2a00f21b2d1adc51c3fd9c39054317c6d88f349d

    • SHA256

      f17a45c8b3ac9adf1a66dfa1b27e62e433adfaabcd36ba52deac1e7c00699f47

    • SHA512

      b642e1be2a26ee20ee8d859535a6afe04640f707090461764f7b563ab6d12bb36bd78b44d0462bfde4271e2c6031124d31595358382d56c679077774072259d9

    • SSDEEP

      12288:m2T93/oterg2+h1QQEroi+YoaUqd+u/2f:P372EMj6Uqd+u+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks