General

  • Target

    f65cccd6bd1b3751308961506d0698b68a12db0db088e5ce5ad1892c80fcc105

  • Size

    364KB

  • Sample

    240629-bh8y9axcma

  • MD5

    9c0af3ad07ec9d3b33df4baf6d0b36c7

  • SHA1

    c86542ff0596159995c15ccfcb9603f169619315

  • SHA256

    f65cccd6bd1b3751308961506d0698b68a12db0db088e5ce5ad1892c80fcc105

  • SHA512

    468ba8ac94fc2768a4cca8e8627990afbdd94df69864bc5828a35bf9a184e175fe6e8e946cfc5772ea1fde385dc8f11aa833e09ece22df32fc0fdeb163cc4ab7

  • SSDEEP

    3072:rMR6Wh1dRpE0v6K2c02eseJZ40f2YiUqeOWQFLDDMdfLApirsDw/uk2AJYdhgcjy:whL5v6JTAor2rBpWQidmDw/ukh4cbKi

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      f65cccd6bd1b3751308961506d0698b68a12db0db088e5ce5ad1892c80fcc105

    • Size

      364KB

    • MD5

      9c0af3ad07ec9d3b33df4baf6d0b36c7

    • SHA1

      c86542ff0596159995c15ccfcb9603f169619315

    • SHA256

      f65cccd6bd1b3751308961506d0698b68a12db0db088e5ce5ad1892c80fcc105

    • SHA512

      468ba8ac94fc2768a4cca8e8627990afbdd94df69864bc5828a35bf9a184e175fe6e8e946cfc5772ea1fde385dc8f11aa833e09ece22df32fc0fdeb163cc4ab7

    • SSDEEP

      3072:rMR6Wh1dRpE0v6K2c02eseJZ40f2YiUqeOWQFLDDMdfLApirsDw/uk2AJYdhgcjy:whL5v6JTAor2rBpWQidmDw/ukh4cbKi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks