General

  • Target

    660e918168fa3e0cc5a47bde693249d0ba164600321b015efe53351875d34f51

  • Size

    1.1MB

  • Sample

    250115-bmwvgsxpgr

  • MD5

    8db7e1ed743e90ff55febccc9a1fae39

  • SHA1

    b9fd77363c2a03372e00b2a1393a45b910e0116a

  • SHA256

    660e918168fa3e0cc5a47bde693249d0ba164600321b015efe53351875d34f51

  • SHA512

    fd6cc730e8ccfbd490e8dc9383637959b687728f634f01a8baec6a919cab6a4de167191d40dfd42e0240030a5c9da15beec658dbdecd26a3a8c90fe9f7f02530

  • SSDEEP

    24576:Xwsx4ZEbjy/7IrR8U1LEvJJsVjFjtoLdzyq15W3aHl+:NbjyUrR8UJIJKVjFjt6xy25Wq+

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Swift_coft.pdf.exe

    • Size

      1.3MB

    • MD5

      7d8bede169266674c8f978cfe0bceeb1

    • SHA1

      b6d643679a42994315bbaafda3c4150182d47a8e

    • SHA256

      62edacaa3a63ed12f86215d3a60c69d15f5c3bac7145a403aead8d8c5a035a2d

    • SHA512

      0fcd7b8487dfe15f1ef9f4726c5d5313f8af318e6281aa0b6cedb20642620309966a4a99c8cf065728e10e5ec2dfa00a2acc894cc1339e4655cd19d4b52377af

    • SSDEEP

      24576:haunU/DmqKHDSns2hZpXl1joed8P6lWf4kF:DU/yqKHcJM0RwF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks