General

  • Target

    7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7

  • Size

    1.2MB

  • Sample

    221130-plgk3adb6s

  • MD5

    0c9c80a0373b2081fa5bb61e8336fb45

  • SHA1

    487a24e1bca88280b8a66da12f77179b1337bd80

  • SHA256

    7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7

  • SHA512

    9d411ffefd29dbe8df0ccaf0270d7a10c46987b8995f1ccd0ce6db5b0d616e8a2249053c3327b8de01bccb88de667933067018c7947c3197da2db498af0e8362

  • SSDEEP

    24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaf1mczftS95:xh+ZkldoPK8YafYQftQ

Malware Config

Targets

    • Target

      7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7

    • Size

      1.2MB

    • MD5

      0c9c80a0373b2081fa5bb61e8336fb45

    • SHA1

      487a24e1bca88280b8a66da12f77179b1337bd80

    • SHA256

      7f8dd52a70ef90b07471dc9f4ae425655fe45b162fba465bdfa8a7effb8e33d7

    • SHA512

      9d411ffefd29dbe8df0ccaf0270d7a10c46987b8995f1ccd0ce6db5b0d616e8a2249053c3327b8de01bccb88de667933067018c7947c3197da2db498af0e8362

    • SSDEEP

      24576:WAHnh+eWsN3skA4RV1Hom2KXMmHaf1mczftS95:xh+ZkldoPK8YafYQftQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks