General

  • Target

    EB3950C34E05DBF1DA544B116FEC8095D765793AFFA21DA28DC6E083842573F2

  • Size

    834KB

  • Sample

    221208-yfl32abc26

  • MD5

    c5c0a553e6b8eb2aa68166c2f10d2250

  • SHA1

    04a71a66a22f630a2e4bbe583152686a27904913

  • SHA256

    eb3950c34e05dbf1da544b116fec8095d765793affa21da28dc6e083842573f2

  • SHA512

    26190b9d11054784550207fe57b0832785bd045f81e947b32c6db9366a26f5328e08edff2249afbfddaa7fe83e76d4abe1c26848c2e163f692ad2d8e396801d9

  • SSDEEP

    24576:a0RXr6LtTnL/h1o8K5z8tPKw4m7tK6vzcXQsCMcw2xU:jXYHh122PKw4EK6bcAHxU

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      GHYJZmLLUrK1rL7.exe

    • Size

      908KB

    • MD5

      21fcab8e0edf4fdf0297025366645193

    • SHA1

      8e33468a95a1310cc7c1e5b3449bfcb12fa0a10a

    • SHA256

      077cead95be622bb2490f027f43449e198f91e189469da4a48adea41d5286e5d

    • SHA512

      0ce4bcf7dc356e47be0cc1f1642fb705d0d5ed0da54d4ee36ce8d4a7ce2da922300cc8262db672324693e2d17a2cc06cae01e0989e2bf30e043404726901edfb

    • SSDEEP

      12288:1ALv2P7Lj/c66AuaClgT70y3awWecpQ26BqPwNK7sb7/sn1gSp4JZn9jq+6cMEFh:SLYLj7Ju/gIyKjyPe7w7En1gSp4Tn9j

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks