General

  • Target

    70e48f3452dddf55daa5970675ce9098cb8b4b3178ba182c78a274d797bbb716

  • Size

    1.6MB

  • Sample

    250119-bllyws1pal

  • MD5

    487f79556ef88bac366e2c59d5126da5

  • SHA1

    974deb3635390ee5ad21accc889e9545e4b96be0

  • SHA256

    70e48f3452dddf55daa5970675ce9098cb8b4b3178ba182c78a274d797bbb716

  • SHA512

    5e38ae16b30fd512423382397c0f0961586884c262f4c9c69e69d59b9ef6c65534d4d7900541353630903e04f7ef9c034a2d6aa03fcdc6acaee9dafac181ee79

  • SSDEEP

    49152:KwvlWqVUe0dBe9VnuXQp48XmXbOUQJxWvT:Kwvl+e0Srugp48XWOvJAT

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      70e48f3452dddf55daa5970675ce9098cb8b4b3178ba182c78a274d797bbb716

    • Size

      1.6MB

    • MD5

      487f79556ef88bac366e2c59d5126da5

    • SHA1

      974deb3635390ee5ad21accc889e9545e4b96be0

    • SHA256

      70e48f3452dddf55daa5970675ce9098cb8b4b3178ba182c78a274d797bbb716

    • SHA512

      5e38ae16b30fd512423382397c0f0961586884c262f4c9c69e69d59b9ef6c65534d4d7900541353630903e04f7ef9c034a2d6aa03fcdc6acaee9dafac181ee79

    • SSDEEP

      49152:KwvlWqVUe0dBe9VnuXQp48XmXbOUQJxWvT:Kwvl+e0Srugp48XWOvJAT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks