General

  • Target

    369b124b5e5194d40f24773d67f55ea81daca621a8c3633b8879f7185ae69943

  • Size

    90KB

  • Sample

    250115-bvaxzswlhs

  • MD5

    7a3e6b8db40c5f09f23629546075cfad

  • SHA1

    160346e541b0a0ec85bb34f887f95a14b1695841

  • SHA256

    369b124b5e5194d40f24773d67f55ea81daca621a8c3633b8879f7185ae69943

  • SHA512

    803939c3291ca7a0bfab2062263c62e1c12795ed62e6fa0d9049a4e880efac2f84371c5cf0e83d821562c7cdb2aafdda8707c2474e24b0e97674e90cec2aed54

  • SSDEEP

    1536:GifOIxXR14PhutZT3cqLXLbegMFWpVl/mEtcDIJEiInv/mq:G2OIxB1C8tZT3cqLXLbeJWbl/mUdErn1

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      369b124b5e5194d40f24773d67f55ea81daca621a8c3633b8879f7185ae69943

    • Size

      90KB

    • MD5

      7a3e6b8db40c5f09f23629546075cfad

    • SHA1

      160346e541b0a0ec85bb34f887f95a14b1695841

    • SHA256

      369b124b5e5194d40f24773d67f55ea81daca621a8c3633b8879f7185ae69943

    • SHA512

      803939c3291ca7a0bfab2062263c62e1c12795ed62e6fa0d9049a4e880efac2f84371c5cf0e83d821562c7cdb2aafdda8707c2474e24b0e97674e90cec2aed54

    • SSDEEP

      1536:GifOIxXR14PhutZT3cqLXLbegMFWpVl/mEtcDIJEiInv/mq:G2OIxB1C8tZT3cqLXLbeJWbl/mUdErn1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks