General

  • Target

    e7737c393131f763069fc218c8591b8616e6fa96b2fa0249bad90241f5368698

  • Size

    683KB

  • Sample

    241119-b1v54sybme

  • MD5

    b16ee56dd840c6739e904da9a5a789d9

  • SHA1

    95d3faddf4a554800bc024929fe56e9d8fb29a03

  • SHA256

    e7737c393131f763069fc218c8591b8616e6fa96b2fa0249bad90241f5368698

  • SHA512

    ed960008bcebd4833eddd7e6b599c5094d5fd63c53a64996b85b7d71d42b9cc243fe5b709dd44654ec24dd454d3657c0f40b7d5c686ddc7afe3665aecd064a60

  • SSDEEP

    12288:oqDE2Ip2xmTMdi8I5cj1Cr1hIzUTdABZwd/CrW0Spi+aX:K0mh1V6U0SpraX

Malware Config

Targets

    • Target

      Bank Details.exe

    • Size

      1.1MB

    • MD5

      b212fa3352a4a6241a7f9e4a4c5f34c7

    • SHA1

      a6f48804432852af371ecf57a8d20c9d431cecab

    • SHA256

      c3920d8006e3e708991f93c1ee2c4f1f38d116ce3bbcce5a0072d11d8f8a19a3

    • SHA512

      d1c2be0deacf9460dc281ee3f1d4bf1e45c0d1f99409a570242446ec2eb9d417ff93f302e09e70c7003b62bb898cbae7683cb3821fd46468d425ff555bfcda97

    • SSDEEP

      24576:stb20pkaCqT5TBWgNQ7aJVI176j07prnV6A:VVg5tQ7aJVIW0T5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks