General

  • Target

    d560a00761c873c47778db0e4501b93e.bin

  • Size

    726KB

  • Sample

    240705-dxpj9s1gmm

  • MD5

    38fb4bdf4b48ddf4c1526b9c07fcfc40

  • SHA1

    41f13a537fd497641ff8a61fa3bca37fe2e71983

  • SHA256

    c7c7d92bd2d00b9f23f6f8f0946f8a584e51e3a811e6b51bb340f36e5113ff1d

  • SHA512

    76d01c4ced5a5f1ddc17f2a7268885e7e4369b1330f9e778f74eacc7b8d2ab3d5b9068e27581b1b209a34ce470c1a8863696d26f2f33e4118af9962c63da6635

  • SSDEEP

    12288:R+iu8MTA61Bg5MuCjeqqhvgNggn/L6grDXNRM1nx5Jgxdwxr74XxX2d9M:IiXMk8B4MuCeqTxuk7MRDJ2YM

Malware Config

Targets

    • Target

      e0b2a21d46eaafd76da52888f1fbbca89592301d69cf9cfe6be58992aa021f9a.exe

    • Size

      1.1MB

    • MD5

      d560a00761c873c47778db0e4501b93e

    • SHA1

      c8032767d547373b2d4c56045eaebb831d49fc3a

    • SHA256

      e0b2a21d46eaafd76da52888f1fbbca89592301d69cf9cfe6be58992aa021f9a

    • SHA512

      c72a0d4ce42d6290134d26627a02dafcd7f79f79e036ae975381d2d5c68f5897331b1e44a65487b9f0c27d7531828d60aeefc47d9a5ee607f559e680307824a5

    • SSDEEP

      24576:zAHnh+eWsN3skA4RV1Hom2KXMmHa1ATE0kX+G7uEEbuyX5:+h+ZkldoPK8Ya1Aot+GCE2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks