General

  • Target

    6cdd63bf78f8d04195086b62ea8c8ac19ba4a351e5877afc233e47ac225ed63d

  • Size

    1.2MB

  • Sample

    241121-yb36ravrd1

  • MD5

    2bc8208045f08e385f836fcec1943d91

  • SHA1

    62b54627e2121206a166967941f2e853eeec2309

  • SHA256

    6cdd63bf78f8d04195086b62ea8c8ac19ba4a351e5877afc233e47ac225ed63d

  • SHA512

    3e73756ccd634f3907b30e1596c45492f3c50b91fecf50bf8cded6623f9f60fa4b893dba48fcb88a41287ef4370a13b6f7e9a1bcab0bd4b0b7a045bb781881e1

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QL9DSf3b/LyDZO5DiM+bC1Y:f3v+7/5QLYPfyDc1/+bmY

Malware Config

Targets

    • Target

      6cdd63bf78f8d04195086b62ea8c8ac19ba4a351e5877afc233e47ac225ed63d

    • Size

      1.2MB

    • MD5

      2bc8208045f08e385f836fcec1943d91

    • SHA1

      62b54627e2121206a166967941f2e853eeec2309

    • SHA256

      6cdd63bf78f8d04195086b62ea8c8ac19ba4a351e5877afc233e47ac225ed63d

    • SHA512

      3e73756ccd634f3907b30e1596c45492f3c50b91fecf50bf8cded6623f9f60fa4b893dba48fcb88a41287ef4370a13b6f7e9a1bcab0bd4b0b7a045bb781881e1

    • SSDEEP

      24576:ffmMv6Ckr7Mny5QL9DSf3b/LyDZO5DiM+bC1Y:f3v+7/5QLYPfyDc1/+bmY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks