General

  • Target

    547f059d0ff161c8af5824ca8809ca66974a47129eb95a26a29cac1471857e53.zip

  • Size

    6KB

  • Sample

    221031-m2lhvaagb3

  • MD5

    7efa435fc04a2a39f8e9cdc19f9b63c8

  • SHA1

    61aa32487c3dca6735ad742155c1eeb3c1d3c9c0

  • SHA256

    1cb2ee0b0a2e6e11aa691f41dc62307102f8122ad36bf6e9dd7717f045aef208

  • SHA512

    0e794e0962999711a043fef18ab1322396c902635ce1fed969bdc961183677c7fbcd4e8dcf2eff64a9873a3869db7e70f2b686bcbc7594ed044e40ef1c0eb5f5

  • SSDEEP

    192:Z6va+JIFMqXh8nhfUl02duDCxNmPMnhG5ew6Ew:U6FMBnBUDomBn45g

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5666831458:AAHU2MDXuo9nXKTEObJr6uVnWF_Bd9cLjL8/

Targets

    • Target

      ACE SUPPLIES & TRADING - Purchase Order #1192022.pdf.exe

    • Size

      25KB

    • MD5

      6a2528f69dec01e24c58258d8e8f7975

    • SHA1

      f4f3f13ec24691c489abb9e1a46cd9d43293f3f9

    • SHA256

      c76e81b63d6f8ab38432243d8043631d3b58495f31c86f4ab529f6948405d9d2

    • SHA512

      b719222be79dcf0351bbe5ca26519fd4e759265727436061ec57fafcdb591acb54711a7a6e43b3a1d29ebfd502dcfe192638c00f9a514d96c712e26e52e7f3b4

    • SSDEEP

      384:p0EWls+j3OLT9O09OO9viTRJu2tBzGcGZptYcFmVc03K:E9j3KBpbvSfugBqbTtYcFmVc6K

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks