General

  • Target

    50aac16f1d22a13adb6a5388b16eed81397926f180aa106fe80ba7e0803199ac

  • Size

    672KB

  • Sample

    241119-b4jlgszbjq

  • MD5

    2dfdee970860313ca665e7b8d7443b9e

  • SHA1

    8b02ebd8619c62bcce26c0fd27bc5959f3daa6e1

  • SHA256

    50aac16f1d22a13adb6a5388b16eed81397926f180aa106fe80ba7e0803199ac

  • SHA512

    aedd45519e0ae2116d77d21cb78cc4b6f471c7cf0dbe2fe1c962e6a5b2993137c726a15017d45410513ac8936dce79f262dee5ac988aff053b62aad018aa126a

  • SSDEEP

    12288:WaqLgI3yPiw7hjfYj5U9zwTYA+o9XrSAPTTxNVuP+6IcVzFS1ZCry5cF:EEzatU5FCXrXZY+BcN6ZC8c

Malware Config

Targets

    • Target

      MV SHENG XING HAI VC112 VSL's DETAILS.xlsx.exe

    • Size

      1.1MB

    • MD5

      b87124b8106c439f73bb9c3a10392ab4

    • SHA1

      0e11440527bf646eab5e4fcdf7f5395d39dd4b7b

    • SHA256

      4fae3c9f5d094331098e06bd94823df6f3c6a049398c1f7c46712a46a06dd66e

    • SHA512

      c8ebbbc6fb3ffc6edaccbed8de66d920f5017fd600155161911e9b6903a4eda84fed8907d3711153cb60e6ecfd07266e20ffe8717cefd663022c557e540fad6e

    • SSDEEP

      24576:vtb20pkaCqT5TBWgNQ7aawGrTkqsvpWq1oIYnvobBSK6A:sVg5tQ7aaHrTE1I6X5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks