General

  • Target

    0b8b3fa0c3fed86cd8760db8caae9c28.exe

  • Size

    852KB

  • Sample

    210114-1vtv9vgnsa

  • MD5

    0b8b3fa0c3fed86cd8760db8caae9c28

  • SHA1

    44d1ee0b8caed12f951d0620087cb118adeb86d6

  • SHA256

    d9f9c20cffb078037e8936fe93ab6237a29b6fe41075305ec1dd5800242606bb

  • SHA512

    56879142acf6d95a05bceac615ec03094672d91c89b2b16d08fdeb74c1eaf880fa3f021f2d3af4032815f8aa19288a02f8abf260fa03c0ccdf1ba853f74da016

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1354395790:AAGs5t1VElMZzeygESEl5DtA0jHdLInLstE/sendDocument

Targets

    • Target

      0b8b3fa0c3fed86cd8760db8caae9c28.exe

    • Size

      852KB

    • MD5

      0b8b3fa0c3fed86cd8760db8caae9c28

    • SHA1

      44d1ee0b8caed12f951d0620087cb118adeb86d6

    • SHA256

      d9f9c20cffb078037e8936fe93ab6237a29b6fe41075305ec1dd5800242606bb

    • SHA512

      56879142acf6d95a05bceac615ec03094672d91c89b2b16d08fdeb74c1eaf880fa3f021f2d3af4032815f8aa19288a02f8abf260fa03c0ccdf1ba853f74da016

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks