General

  • Target

    1fc8b5c5918ef41de9ccf05cd39c738bf16df4ab6ed7538145fe6f89419f354a

  • Size

    589KB

  • Sample

    240629-bn6q3sxdpe

  • MD5

    ba7f90c3b1d6f90ccaa58b8e9a439662

  • SHA1

    80912e5f54155a5a384e134196420f696fb7d406

  • SHA256

    1fc8b5c5918ef41de9ccf05cd39c738bf16df4ab6ed7538145fe6f89419f354a

  • SHA512

    ecd7ef167590699212e082e940591347dc7339192ed2a51a926ca0b9ec4dc39e2e6f7fb61636ddf59273b1772aa7d8e36c74d7a0ca15ef24eed2f9ba2f31de0d

  • SSDEEP

    12288:ZOK+cDtCaKVvTkLsDSdWkORQUiLcXW3XJ64DGzZMueipqDKMM:EGAZVL1D0CEcXWZ64mZMWM

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1fc8b5c5918ef41de9ccf05cd39c738bf16df4ab6ed7538145fe6f89419f354a

    • Size

      589KB

    • MD5

      ba7f90c3b1d6f90ccaa58b8e9a439662

    • SHA1

      80912e5f54155a5a384e134196420f696fb7d406

    • SHA256

      1fc8b5c5918ef41de9ccf05cd39c738bf16df4ab6ed7538145fe6f89419f354a

    • SHA512

      ecd7ef167590699212e082e940591347dc7339192ed2a51a926ca0b9ec4dc39e2e6f7fb61636ddf59273b1772aa7d8e36c74d7a0ca15ef24eed2f9ba2f31de0d

    • SSDEEP

      12288:ZOK+cDtCaKVvTkLsDSdWkORQUiLcXW3XJ64DGzZMueipqDKMM:EGAZVL1D0CEcXWZ64mZMWM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks