General

  • Target

    0c4cc722355e7fb248c26a0e0f954a0985b1dce77b4a24e3c8c581aeece0f07b.exe

  • Size

    708KB

  • Sample

    241119-nnwx4awdrk

  • MD5

    a5d35a6a07f4a3224285273c1d465a32

  • SHA1

    dbeab27b1e82f2a254f8ebf61684a68b3f283eea

  • SHA256

    0c4cc722355e7fb248c26a0e0f954a0985b1dce77b4a24e3c8c581aeece0f07b

  • SHA512

    a86068835595215209df79749e5acd2f5cf0a7f1b9cac5d1d7c651c1cc026d285da88d926e6a7fcdeba0fa743685d7a46468c8ff9aaf0fc14dc3a98e21e60722

  • SSDEEP

    12288:0sHzOUNUSB/o5LsI1uwajJ5yvv1l2IXnQZQFb/m5FUzDxidlNsRexeDNl9q:XiUmSB/o5d1ubcv/XQia0zDxi7iIeDN2

Malware Config

Targets

    • Target

      0c4cc722355e7fb248c26a0e0f954a0985b1dce77b4a24e3c8c581aeece0f07b.exe

    • Size

      708KB

    • MD5

      a5d35a6a07f4a3224285273c1d465a32

    • SHA1

      dbeab27b1e82f2a254f8ebf61684a68b3f283eea

    • SHA256

      0c4cc722355e7fb248c26a0e0f954a0985b1dce77b4a24e3c8c581aeece0f07b

    • SHA512

      a86068835595215209df79749e5acd2f5cf0a7f1b9cac5d1d7c651c1cc026d285da88d926e6a7fcdeba0fa743685d7a46468c8ff9aaf0fc14dc3a98e21e60722

    • SSDEEP

      12288:0sHzOUNUSB/o5LsI1uwajJ5yvv1l2IXnQZQFb/m5FUzDxidlNsRexeDNl9q:XiUmSB/o5d1ubcv/XQia0zDxi7iIeDN2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks