General

  • Target

    17f75c9367a6819d27ca5d3443cb1f33c1dbda019e4a8025af6c14d04336c5bc

  • Size

    623KB

  • Sample

    240702-bjag3s1cnd

  • MD5

    24073fbfe0ff33921ef0b5f40f329a2a

  • SHA1

    a6202047e5b685347a884b22c1373821e6e1f730

  • SHA256

    17f75c9367a6819d27ca5d3443cb1f33c1dbda019e4a8025af6c14d04336c5bc

  • SHA512

    559c985beba9ccfe805124fed71548e9b4cf4449f0ebcc3aa228556ed2757b81081a6d7a83f99ef50238651ba32f3825c6a7ef7c3b9c7762817a1f4d5c4b1d49

  • SSDEEP

    12288:bfx4aFp0wFCtCgB6ye2TqH3kkO4+HhGw92QW1n1/OpVV38NRM4DmMkiLWbTg3Nj:bfxLpNUpB8r3kkON9nWx1/OfmTD5kiL3

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      54250301A0185.exe

    • Size

      1.0MB

    • MD5

      4ba92983f288a57b1dd108ae4e593f75

    • SHA1

      dffb75dc8fe3e93efffa241c0fc150a5ea4ed923

    • SHA256

      27efe0a1005d935a64f7605b0c6aeca4fcd28a07889a50f9a3f996f58041882a

    • SHA512

      32b7b2a6ee325ab777a1f46d2244b8ef72b1b92ec5c2527f7a918659153dafaf8f939ca183472ca2acc5ebfbfde4be0d24b85eb3b13cfe1ec77a409492e3fcb7

    • SSDEEP

      24576:aAHnh+eWsN3skA4RV1Hom2KXMmHa5MqLD5kiLCxt5:th+ZkldoPK8Ya5MBiLCd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks