General

  • Target

    SecuriteInfo.com.Win32.CrypterX-gen.9890.26534.exe

  • Size

    2.1MB

  • Sample

    221208-cyldkagg77

  • MD5

    e352926254c0b72191760d5bcae2ae7b

  • SHA1

    26095ff1515f6d6a9756b101a7380d9e0a150244

  • SHA256

    f5d6a197009690d03147e996e2d8af40fa944187e6d8e9c0413c4efce80bda16

  • SHA512

    99c72945f805b36f1edcf0ab40e7edfc858aa4b38bb34d8660897af759dd252371351993778374772a8fcd890bd5ed57eb9a0851d9e31b13f4db47f59717dea3

  • SSDEEP

    49152:ZQ9MITWyGqkql2snjaW1Wt2IiXQOjj24M+9axubhfBih/5:q9ZWyHk8J1WfiVMUakVa

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5381304443:AAGHVkAfThlNIr1QK0cvWGNfRmolq65orZw/

Targets

    • Target

      SecuriteInfo.com.Win32.CrypterX-gen.9890.26534.exe

    • Size

      2.1MB

    • MD5

      e352926254c0b72191760d5bcae2ae7b

    • SHA1

      26095ff1515f6d6a9756b101a7380d9e0a150244

    • SHA256

      f5d6a197009690d03147e996e2d8af40fa944187e6d8e9c0413c4efce80bda16

    • SHA512

      99c72945f805b36f1edcf0ab40e7edfc858aa4b38bb34d8660897af759dd252371351993778374772a8fcd890bd5ed57eb9a0851d9e31b13f4db47f59717dea3

    • SSDEEP

      49152:ZQ9MITWyGqkql2snjaW1Wt2IiXQOjj24M+9axubhfBih/5:q9ZWyHk8J1WfiVMUakVa

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks