General

  • Target

    88f9a205f2b142304fe21997e0b0c06bf4d7b0277a9aff15d464aa3c332a3a33

  • Size

    425KB

  • Sample

    250117-bfhpaaxkaw

  • MD5

    6ac59cdf812e078404ced310c700a2d1

  • SHA1

    cd655766af34c595a16fe232320349a39351e95b

  • SHA256

    88f9a205f2b142304fe21997e0b0c06bf4d7b0277a9aff15d464aa3c332a3a33

  • SHA512

    efb305af2a083d4b4137e2f87f37d26a1359f5eefeae61f1c0f422d5473b1d6c5c19f95751ce2d17fadb3656a51fd93d80d5ee7da74090c54a728230cb42b1ba

  • SSDEEP

    6144:zCPXpKOghAzCyl96vNfrX+80jcBODVWKxpQP6Pq/9GjBr1:uXpC05l96lDXHA/xpRq/ojL

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      88f9a205f2b142304fe21997e0b0c06bf4d7b0277a9aff15d464aa3c332a3a33

    • Size

      425KB

    • MD5

      6ac59cdf812e078404ced310c700a2d1

    • SHA1

      cd655766af34c595a16fe232320349a39351e95b

    • SHA256

      88f9a205f2b142304fe21997e0b0c06bf4d7b0277a9aff15d464aa3c332a3a33

    • SHA512

      efb305af2a083d4b4137e2f87f37d26a1359f5eefeae61f1c0f422d5473b1d6c5c19f95751ce2d17fadb3656a51fd93d80d5ee7da74090c54a728230cb42b1ba

    • SSDEEP

      6144:zCPXpKOghAzCyl96vNfrX+80jcBODVWKxpQP6Pq/9GjBr1:uXpC05l96lDXHA/xpRq/ojL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks