General

  • Target

    SecuriteInfo.com.Trojan.MSIL.Crypt.13190.971.exe

  • Size

    716KB

  • Sample

    221125-d1w4hsha77

  • MD5

    24a6b2d7d65f5a04989d064c87426815

  • SHA1

    e18c4c971791e14d3c8f059f8bce04a61e5ef619

  • SHA256

    cd3ba304f3ef65515002d44fdcc5eee5f5a356be927ef4a2f257ba6b1ff08a53

  • SHA512

    474d36fdb92e9d5c534fbd3061328304fb527f901cb6af40fd76f47c926a7a845280796b955ce15402e5a8c12b2581580133c322d8a6eccb9beafcee04344905

  • SSDEEP

    12288:cc0/Xe+PIeMkqG7lUBYkd3EhJbNSw0uLXwpjSC2mZJbxpDF:3Wu+zMkqG7+BR3EhZNSw5jwIC2

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5744211523:AAHNYX03JvGJaCmeHR-kYp0NO5dKTzd5PeI/

Targets

    • Target

      SecuriteInfo.com.Trojan.MSIL.Crypt.13190.971.exe

    • Size

      716KB

    • MD5

      24a6b2d7d65f5a04989d064c87426815

    • SHA1

      e18c4c971791e14d3c8f059f8bce04a61e5ef619

    • SHA256

      cd3ba304f3ef65515002d44fdcc5eee5f5a356be927ef4a2f257ba6b1ff08a53

    • SHA512

      474d36fdb92e9d5c534fbd3061328304fb527f901cb6af40fd76f47c926a7a845280796b955ce15402e5a8c12b2581580133c322d8a6eccb9beafcee04344905

    • SSDEEP

      12288:cc0/Xe+PIeMkqG7lUBYkd3EhJbNSw0uLXwpjSC2mZJbxpDF:3Wu+zMkqG7+BR3EhZNSw5jwIC2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks