General

  • Target

    PO#4502288712.rar

  • Size

    1.2MB

  • Sample

    250120-r9vtpsvlgp

  • MD5

    52dd2886c2a5698e58955cec8f2b4d37

  • SHA1

    689c92f0f9178798b21f924e7adad213e6149a8f

  • SHA256

    fec34fa3a463f732c5197a4d1bb3649ed5f5a84e3d0bdc664849d0033c4954ba

  • SHA512

    6851a350d4d3de40050b7b7832ef5af64a817617f3f8bf6576a345cf7cb9302e82b6e671c7e4dd958626a39fbebed6a1fb1bdb30f34c82d04592c97914cf9120

  • SSDEEP

    24576:5Tas/0uMdFCHSmfTXFyAyaAL7sDKWtvnXiX3xxzIfd0diAIe:lrCsHBfTXFyhadBvXG3Od0dSe

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO#4502288712.exe

    • Size

      1.5MB

    • MD5

      813b425453f7dfea626aa389f639aa4d

    • SHA1

      d4b70a0235288476c18be713e7763b35bbe726af

    • SHA256

      1cc991649d6186d487d5ff01fe3d0dee7c9383d5c3b43d814ea353e5d82c7372

    • SHA512

      8ff65b9e8713aff085459015e946184d08cc984fdf6db4cab94e4df63b5d306450dc2ddc872aa8480e03136dfb968e7b2a04815c02d232a38b5418bd782cf24f

    • SSDEEP

      24576:df343jiBIhZZBsNOHVj9tTA8yBq6u2SVoTsh7SenmQob43zMksGJM6oi+1q+:mUIhZZBsNOHVj9n49PTg7brKezBheU+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks