General

  • Target

    087dc1c2cc13ba7c5c4f9708d64e8c254be1b485d782ffd39b9598d06252248e

  • Size

    927KB

  • Sample

    241115-cbkthswhkl

  • MD5

    d6d1cfaca268a9d077a5140712440d3a

  • SHA1

    0178bf774073cdbb56b7244c5a6723ff4bdc01a0

  • SHA256

    087dc1c2cc13ba7c5c4f9708d64e8c254be1b485d782ffd39b9598d06252248e

  • SHA512

    a20a5371e44dfa7766806b8505857d7145efa12b18fb0fe5fbc14f08949dcd1802d19ab2561984c80b4b5426786bb46c374ad38f8102a3a1671d806f6d8d2d67

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCyo6THE/01V9n/L:7JZoQrbTFZY1iaCyrE/YV9/L

Malware Config

Targets

    • Target

      087dc1c2cc13ba7c5c4f9708d64e8c254be1b485d782ffd39b9598d06252248e

    • Size

      927KB

    • MD5

      d6d1cfaca268a9d077a5140712440d3a

    • SHA1

      0178bf774073cdbb56b7244c5a6723ff4bdc01a0

    • SHA256

      087dc1c2cc13ba7c5c4f9708d64e8c254be1b485d782ffd39b9598d06252248e

    • SHA512

      a20a5371e44dfa7766806b8505857d7145efa12b18fb0fe5fbc14f08949dcd1802d19ab2561984c80b4b5426786bb46c374ad38f8102a3a1671d806f6d8d2d67

    • SSDEEP

      24576:uRmJkcoQricOIQxiZY1iaCyo6THE/01V9n/L:7JZoQrbTFZY1iaCyrE/YV9/L

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks