General

  • Target

    591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce

  • Size

    837KB

  • Sample

    221206-j97jhaaa26

  • MD5

    5b0b65b9ad793f8d127a90f7f31e8d39

  • SHA1

    6a7ede3e8f6064ec1a0b0ddaf97887d8d3567fe3

  • SHA256

    591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce

  • SHA512

    ec31b35402802af0ec85035071ddd66921d02a98d7b385cc3e8a727c1b6a1d4aa948d02cb6accb54ef346b166b5ee7fea855ef35f8017d449d89c96939f7e4df

  • SSDEEP

    12288:Fc3fYBSWcVlcLOaYKzqCig4fVTMHPKX3QPKvjma/gKZ/nXt7virmWhlGLaQYI:egBiqOaZzxigO5MCQPKr

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1048308947817353288/5ypgS4XmSt1xW_MYhzjePp8jxnOIkdnEO0OTccrP0m7sB3ynEyezAUtrX-js6a4kTsJ8

Targets

    • Target

      591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce

    • Size

      837KB

    • MD5

      5b0b65b9ad793f8d127a90f7f31e8d39

    • SHA1

      6a7ede3e8f6064ec1a0b0ddaf97887d8d3567fe3

    • SHA256

      591e486f7e4431a0be2cd22abd2c4ad9c97f4eeaf8a387ef816fa32e15b267ce

    • SHA512

      ec31b35402802af0ec85035071ddd66921d02a98d7b385cc3e8a727c1b6a1d4aa948d02cb6accb54ef346b166b5ee7fea855ef35f8017d449d89c96939f7e4df

    • SSDEEP

      12288:Fc3fYBSWcVlcLOaYKzqCig4fVTMHPKX3QPKvjma/gKZ/nXt7virmWhlGLaQYI:egBiqOaZzxigO5MCQPKr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks