General

  • Target

    337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5.exe

  • Size

    103KB

  • Sample

    250111-dc2zvszpcw

  • MD5

    d94c4aad05654b76b8b2624808355886

  • SHA1

    f3c7911d8834836c22d78da8ae22e790ccd1429d

  • SHA256

    337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5

  • SHA512

    de80c7528d00e618a5071b93ccaf86cc697df6219f9e5adb4036aff163a9e87b88a461a8a36adecda1eebefd52d97630ac6d777c8c7a127759e2ea46938e0896

  • SSDEEP

    768:79tVmtzb9+Os5hidy/vn61YPkAbBfmFdEugpWWF2zIV9XeS+ST6nkAv:BtVH7DidIkVFdvD0iIC/m8

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5.exe

    • Size

      103KB

    • MD5

      d94c4aad05654b76b8b2624808355886

    • SHA1

      f3c7911d8834836c22d78da8ae22e790ccd1429d

    • SHA256

      337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5

    • SHA512

      de80c7528d00e618a5071b93ccaf86cc697df6219f9e5adb4036aff163a9e87b88a461a8a36adecda1eebefd52d97630ac6d777c8c7a127759e2ea46938e0896

    • SSDEEP

      768:79tVmtzb9+Os5hidy/vn61YPkAbBfmFdEugpWWF2zIV9XeS+ST6nkAv:BtVH7DidIkVFdvD0iIC/m8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks