General

  • Target

    Zag7baiAIOkdqsl.exe

  • Size

    1.0MB

  • Sample

    220930-f69mxadebp

  • MD5

    0854e6384e488eb41333cc04e6771a9c

  • SHA1

    769f0c4b367c442ab0976fe91eef035a5299600a

  • SHA256

    ea1bcb7a814c69463a8d4f24162e0f228600287b74c7fbddfafa0f1972670e24

  • SHA512

    413bcfa312f58679d9bf942d2f3895c4270a5604e9cda68ca2895dfa7a6102fc6c691ac2165ef9f1ad9fd8f4dda2d468f07d883955baf08f9eeaf0cf4272bd41

  • SSDEEP

    12288:AAeY2iNw0+9MKcAJsSPoSRruT+s0jdKNBe/qjJ5nWMD65B4wIKhxGS+s6gdZxJ:AAJ1Ie6nwSRruT+bAhjrW

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5015424630:AAHYFU1sKtYqSORHBErFCWNjJz1TpXKj30w/sendDocument

Targets

    • Target

      Zag7baiAIOkdqsl.exe

    • Size

      1.0MB

    • MD5

      0854e6384e488eb41333cc04e6771a9c

    • SHA1

      769f0c4b367c442ab0976fe91eef035a5299600a

    • SHA256

      ea1bcb7a814c69463a8d4f24162e0f228600287b74c7fbddfafa0f1972670e24

    • SHA512

      413bcfa312f58679d9bf942d2f3895c4270a5604e9cda68ca2895dfa7a6102fc6c691ac2165ef9f1ad9fd8f4dda2d468f07d883955baf08f9eeaf0cf4272bd41

    • SSDEEP

      12288:AAeY2iNw0+9MKcAJsSPoSRruT+s0jdKNBe/qjJ5nWMD65B4wIKhxGS+s6gdZxJ:AAJ1Ie6nwSRruT+bAhjrW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks