General

  • Target

    3A6FED5A4FA870CFC6D6A5DDE2136C3FED7F97AE34F0C11A902EA2008D6FC2B5

  • Size

    1.5MB

  • Sample

    221123-r26agaac42

  • MD5

    84e9f7f00e0315e7fe4bdfd4cc8496ee

  • SHA1

    5f2f3ca0a15b3286778d3d42a580dbac3a24cdbe

  • SHA256

    3a6fed5a4fa870cfc6d6a5dde2136c3fed7f97ae34f0c11a902ea2008d6fc2b5

  • SHA512

    e8f38c01afea0c3ca95dbf9dd551e0a3b15d900307fdfbefc5b02bf7f269953d8c0277575ff8fc9015f91b8ce6bd13caaf6ccc3ec98582c882ca1c0568ccf38e

  • SSDEEP

    24576:68TAqbDuUBSOmS5aMy8282V5UZXq7afs:TDXBVmMa9URqGU

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5796842243:AAESM2w0ubqts6zEsE_xN4PZ56pLfxQ9e7M/

Targets

    • Target

      20211104.EXE

    • Size

      936KB

    • MD5

      77694f1cfa30a4ea6c65be837dd013d9

    • SHA1

      e1ce7bf4c2ca9f342c12a56d9dcee84891f62f8b

    • SHA256

      248a39f30a5d874ed2c08048affc38d9fc6cce83e784e7bfe43f2ff41fc59258

    • SHA512

      ae7433c89d83fab3cb01c641ee2d7437c3dd0ac196219249cfd1e89f392a5d440d595141d3a4f6676fd8fa3bb41ac7dd6e51b5f1ec59109f8abe4d60a6a0b36f

    • SSDEEP

      24576:D8TAqbDuUBSOmS5aMy8282V5UZXq7afs:QDXBVmMa9URqGU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks