General

  • Target

    8f979f812f0eba57cae2be575a30bf0622265a594c59ccae90f651fb4ebe25a6

  • Size

    1.4MB

  • Sample

    250115-bp1w8awkd1

  • MD5

    7aa4201258e61a128b633b887c1f9a5e

  • SHA1

    a550b9095dda1247af6071285428c5e870b60f0e

  • SHA256

    8f979f812f0eba57cae2be575a30bf0622265a594c59ccae90f651fb4ebe25a6

  • SHA512

    192c19c597b372a0ca5f01d9d5dfe8ae14bbc59ac6f41185246e4c2a8a44f04954a270727d619dc7d95d3439ee4fa1bcc49aa1b35765683870fd94d7100f8616

  • SSDEEP

    24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aol3MIcAa2ERu8JpcnbJr:CTvC/MTQYxsWR7aoLZDMCJ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8f979f812f0eba57cae2be575a30bf0622265a594c59ccae90f651fb4ebe25a6

    • Size

      1.4MB

    • MD5

      7aa4201258e61a128b633b887c1f9a5e

    • SHA1

      a550b9095dda1247af6071285428c5e870b60f0e

    • SHA256

      8f979f812f0eba57cae2be575a30bf0622265a594c59ccae90f651fb4ebe25a6

    • SHA512

      192c19c597b372a0ca5f01d9d5dfe8ae14bbc59ac6f41185246e4c2a8a44f04954a270727d619dc7d95d3439ee4fa1bcc49aa1b35765683870fd94d7100f8616

    • SSDEEP

      24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8aol3MIcAa2ERu8JpcnbJr:CTvC/MTQYxsWR7aoLZDMCJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks