General

  • Target

    808f416218be5633bdee356f7c759ecc06a8c29dbfe25eb139be8995877f6582

  • Size

    524KB

  • Sample

    250123-bqme8awmbq

  • MD5

    463aebf2e7eb05d79e2d8cbfe8e6906f

  • SHA1

    6bcd822b22c5a0fa533104edb00a7693dc0f1fbb

  • SHA256

    808f416218be5633bdee356f7c759ecc06a8c29dbfe25eb139be8995877f6582

  • SHA512

    9c8c6bcf751b1032acbb0c05d6d1544aeeb7e55a98ce691a1c699787a4f2c89a0477e665097598e98828a6063c4b99a4e010b4521df0e9cf4b22f75dbc9b61a4

  • SSDEEP

    12288:Gew3A2c3JXZvSJZzQ3pXJYbfTvrsYtwQEAE:Geww2CYQ3pX+rTvriAE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      DATASHEET.exe

    • Size

      464KB

    • MD5

      07125fc15f7a109f6a067d38257faa94

    • SHA1

      c196c27cd72a380dc5d4864831320f9d00078d73

    • SHA256

      f72267ce7456d977ff81981b8704a697b2198263570203f394c5a306705d8a70

    • SHA512

      d5d0ac6bb5e0f09e0b55fe505eb0e8f407408154ba604894cf57a3da07779f5b63f202ec92ce45bf59c9454daa9315ec51657b3db01d0b16c79dc42377ef747b

    • SSDEEP

      12288:Jew3A2c3JXZvSJZzQ3pXJYbfTvrsYtwQEAE:Jeww2CYQ3pX+rTvriAE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks