General

  • Target

    68F921D55E5EBBC383106E2DE957DFD3A9DB76117D8BAEAF60D824954E4C3DD4

  • Size

    687KB

  • Sample

    250103-jpeyravlbz

  • MD5

    e78c1dbf5a60565752827b9da8be8f7c

  • SHA1

    4a12a76c1156ba36a5ba6c71d861d9fb6d67b625

  • SHA256

    68f921d55e5ebbc383106e2de957dfd3a9db76117d8baeaf60d824954e4c3dd4

  • SHA512

    83e1c643808598d18ab70b46322c6809f4c08bbe2ad2459674bb5c0d48ecc42251ccda9b2b169be576299c2598633fdd8c07b54c4f7cfccb087be9c72af6ffca

  • SSDEEP

    12288:MYV6MorX7qzuC3QHO9FQVHPF51jgcSpMQQpDkzgsp6YTzV+nvZSDaK4Tc0jNu:rBXu9HGaVHS2JDHY8vwaK4TNc

Malware Config

Targets

    • Target

      68F921D55E5EBBC383106E2DE957DFD3A9DB76117D8BAEAF60D824954E4C3DD4

    • Size

      687KB

    • MD5

      e78c1dbf5a60565752827b9da8be8f7c

    • SHA1

      4a12a76c1156ba36a5ba6c71d861d9fb6d67b625

    • SHA256

      68f921d55e5ebbc383106e2de957dfd3a9db76117d8baeaf60d824954e4c3dd4

    • SHA512

      83e1c643808598d18ab70b46322c6809f4c08bbe2ad2459674bb5c0d48ecc42251ccda9b2b169be576299c2598633fdd8c07b54c4f7cfccb087be9c72af6ffca

    • SSDEEP

      12288:MYV6MorX7qzuC3QHO9FQVHPF51jgcSpMQQpDkzgsp6YTzV+nvZSDaK4Tc0jNu:rBXu9HGaVHS2JDHY8vwaK4TNc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks