General

  • Target

    PO.rar

  • Size

    1.2MB

  • Sample

    250403-kn7g2swmx4

  • MD5

    3c068d084ad2a4d4330427aa07c26bed

  • SHA1

    3a785fb9102798deb719826ad8f06d924664a911

  • SHA256

    4ca6f21ed0317d5f6c8c2c7098a6b445011f650f3ea86d8596664d9d5238c223

  • SHA512

    33eeff53cd3674e1963f39dc790ef9a38fbcb0a7c3703aefb53d1881cd7d398357c11116c6a30c8f87d762feae9bdee9f9e2d9bb4bfa0eb6180e8a57012f80c1

  • SSDEEP

    24576:kTkoSxkfzz7/SHH3x0kthiKpnibAO8bvS9LFb6VX4cIIb0+DBb2FZIHRkYWOsQNv:kTboeK9DliEO8bvS9hb6VItIQubqZIHb

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO.exe

    • Size

      1.4MB

    • MD5

      ab51b833c511b090e286527580db32e8

    • SHA1

      48a0b39900158e0f5fbd804603244fd07df28d83

    • SHA256

      a017ebe5d908a488c9fe0e16c08d8dece7eeb761eae0f29a873ede41a751bccb

    • SHA512

      69d7a5717c83f5ffd55a104e8ce1253a7d724b4bde882b17f47eb100a8f5147eb1142d180e972df509927dffdd2c048e550ec656ed52e5dfd303309b9d2b25b1

    • SSDEEP

      24576:+RRHGVP2hQ9ytwN5iaJ8A4WGT9Hq8ziqBmpU4RHakm2IpBT:+RAIMh8ZjRq8Gq0pU41aT2InT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks