General

  • Target

    4b6cc2a292238a5ed644954ab8360dc523244319788a9f4c3b15fd1d2ba493e5

  • Size

    1.1MB

  • Sample

    250114-cjdp6swlej

  • MD5

    7d1502a1c9f0244d8ab6a76a08a4b58d

  • SHA1

    9c0c1397f58a2ce95cf96e93047357bd068a4f03

  • SHA256

    4b6cc2a292238a5ed644954ab8360dc523244319788a9f4c3b15fd1d2ba493e5

  • SHA512

    79cde5bc4b6234a0423893295877745960bd57c31644dee3812ca03c36e266ebfdb9dd81737112ce3033b71b7269ef671e169090a624a1d14f242de0cef68477

  • SSDEEP

    24576:qg/+oQJZiWsdKdN6d/xkeJjmjDbssIBtyg/8Kk:WTedKOd/jeDQtyP

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      F25-Try on pdf.exe

    • Size

      1.3MB

    • MD5

      6df84e1338b2efb7200ff1a7539b9290

    • SHA1

      8aa472897a6359e137f4ac7b39191d10aa33315b

    • SHA256

      71b9fb3f5b06fc5f1a1e50b744c376c6048452f6f8fa246a96b1d8626fc8133d

    • SHA512

      4c13b99126f11f68af1960c7ae71a6f8833b0f56e2dc32033f6bc7116cdc52f4ba50a97947768ab381103752211eb6bed9bb5afc22b8ac1116a03b0b3558c85b

    • SSDEEP

      24576:LdlRLWN2O4KCo48p7zB+LiGZl3YUoHY/gxJIpv6YVqpb+xc3q1vDl4y1qy:LzRL02O1CZ85zB+pPYt4/tS8xx4/y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks