General

  • Target

    5eaa122df4c467a6dff8312705ed1de0.exe

  • Size

    210KB

  • Sample

    220928-mn9zaaggbm

  • MD5

    5eaa122df4c467a6dff8312705ed1de0

  • SHA1

    059aa46bd275127f012a12c739fdef17c0b05270

  • SHA256

    9aefb95bb55fad7ef142aac07a042f90602fa2c3f5f34be169b2763966099e0a

  • SHA512

    49274c17c8373dec1c2793264d3011bf122fe49547dc77933d4d36ba0f57614bef84c0a299224d228c5d2d2f8a31503eee23809ead881835f3a40b4dd0dd11d1

  • SSDEEP

    3072:8UGIKS+MXh+G/uhyAPfRW5SqmbiUahfPj9H+ITKvbSNHhi4xIzYg5Cska4Aly:zGAtKnRFWUahfPj9eJeVDxIFCfa

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5693260396:AAG301OwiHGjRjWm756cKDUffx0R4fjsv4k/sendDocument

Targets

    • Target

      5eaa122df4c467a6dff8312705ed1de0.exe

    • Size

      210KB

    • MD5

      5eaa122df4c467a6dff8312705ed1de0

    • SHA1

      059aa46bd275127f012a12c739fdef17c0b05270

    • SHA256

      9aefb95bb55fad7ef142aac07a042f90602fa2c3f5f34be169b2763966099e0a

    • SHA512

      49274c17c8373dec1c2793264d3011bf122fe49547dc77933d4d36ba0f57614bef84c0a299224d228c5d2d2f8a31503eee23809ead881835f3a40b4dd0dd11d1

    • SSDEEP

      3072:8UGIKS+MXh+G/uhyAPfRW5SqmbiUahfPj9H+ITKvbSNHhi4xIzYg5Cska4Aly:zGAtKnRFWUahfPj9eJeVDxIFCfa

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks