General

  • Target

    MvStarSuzanna-2.pdf.scr.exe

  • Size

    1.1MB

  • Sample

    250403-eellbsyvex

  • MD5

    c522d9d33449816046f9edd5f714a9ab

  • SHA1

    cdcae06501413499e97d3d3deb16e9e479be7e35

  • SHA256

    a73a6ad6bba38d4ecb83ec7d4c3869afa3888597f362033dd50e9c4e0ca37835

  • SHA512

    24a6045de5e7fb3ee978a554a0a2960c9479f0e2144ec97fbd9395d36f2e614279e40c56129aedce1df57be14ff3af433f29ccfe5186874b63fe28d10cb7bb81

  • SSDEEP

    24576:wu6J33O0c+JY5UZ+XC0kGso6FajvsU0qI691fzMIZWY:6u0c++OCvkGs9FajEUU69RMlY

Malware Config

Targets

    • Target

      MvStarSuzanna-2.pdf.scr.exe

    • Size

      1.1MB

    • MD5

      c522d9d33449816046f9edd5f714a9ab

    • SHA1

      cdcae06501413499e97d3d3deb16e9e479be7e35

    • SHA256

      a73a6ad6bba38d4ecb83ec7d4c3869afa3888597f362033dd50e9c4e0ca37835

    • SHA512

      24a6045de5e7fb3ee978a554a0a2960c9479f0e2144ec97fbd9395d36f2e614279e40c56129aedce1df57be14ff3af433f29ccfe5186874b63fe28d10cb7bb81

    • SSDEEP

      24576:wu6J33O0c+JY5UZ+XC0kGso6FajvsU0qI691fzMIZWY:6u0c++OCvkGs9FajEUU69RMlY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks