General

  • Target

    3fc0584d7e8bae6b99cdd7df9b0ea3c2bb8aab214cf542a11eaf96422adfbaa6

  • Size

    590KB

  • Sample

    241212-bp6sgavpgz

  • MD5

    a528aee5198c699fd272f820f9cd8839

  • SHA1

    72a0f07d16107e078bbb162880b4f9a6b33ecee4

  • SHA256

    3fc0584d7e8bae6b99cdd7df9b0ea3c2bb8aab214cf542a11eaf96422adfbaa6

  • SHA512

    91e4a7ea7c4c143033d31ccd95ac4cc19247bb2e013296f24a0a61db2fa7f88e74d21c32a01fe5b81d7ac7ea56635cded06056773cc68c5e9ae74e305db7e547

  • SSDEEP

    12288:ubANYiHoXwLlczaeRhsM5EfwYZlcGDfQQ5xuhkk0B9kg0k:ubANY6oXcEae/sM5Ef3f5gofR

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alltoursegypt.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    OPldome23#12klein

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      23-24072 IGR2311048295.exe

    • Size

      1.0MB

    • MD5

      3a51fd0abef41efb52e2b4705875c1cf

    • SHA1

      28d940c5b6fac38323dbb74b267769b41f8f94c0

    • SHA256

      38753c268734560799d368d730ec53c48456666d9e3c77d372b7f0648328cc9e

    • SHA512

      4ac1d4654fe068669fd13888050b06456e86689353a4cfe9591de4b9211b0b5ab93b7874d8be28d80b0c686ce5ee477a64f0a96be3e8e7f5808915b535f27666

    • SSDEEP

      24576:ku6J33O0c+JY5UZ+XC0kGso6FaZPk0aPNmp+HWY:eu0c++OCvkGs9FaZPraP0p5Y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks