General

  • Target

    E-Notification(Swift_Copy_000948736MTCB3827).zip

  • Size

    664KB

  • Sample

    250328-qlgrhaykv2

  • MD5

    38f19ce22038a09cdf87cbee300fcd5b

  • SHA1

    31770844ff5d86d5969b8ce12d1c413e3950877b

  • SHA256

    f2d10e5bbaa0e8c55dce360d2917f34eca5ffedc0c0b5b226e321bff7a581c2d

  • SHA512

    bb792a478ca4de207147eb79845320878cf7ea8c27b1776acfb7b586c3f99551c3430860626b2329a3c14bb2554bc6f031bff7ef626659780b43eebf112f5611

  • SSDEEP

    12288:SimaBuJojCRCRqvFx1WBluhKt3FQ/G+/WA2Lr7afW63rdFI5Tad5nB76tgU:ThuS+RCM7oBMhKpUWUTFwsar

Malware Config

Targets

    • Target

      E-Notification(Swift_Copy_000948736MTCB3827).exe

    • Size

      1.1MB

    • MD5

      41d58997e17d288cdf4733313e23e81c

    • SHA1

      285f17ba04fdbcca6f18f8b61e8c794aa4ccabae

    • SHA256

      63c0e81868b4d1d5744152cb95cbe7bdaaa4bc2670037276de94d80e5b0539c5

    • SHA512

      7e46c84f4a09862472efec7d030fced7e2f6be2a6b4d9f2363837f44db7bb67285e1b5951c8c8053d9aa73edf952c254ca5e1479ea46d6010290624972d84c5a

    • SSDEEP

      24576:3u6J33O0c+JY5UZ+XC0kGso6FaUiuxpZPFa2bG6WY:Ru0c++OCvkGs9FaUiufu2OY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks