General

  • Target

    2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190

  • Size

    952KB

  • Sample

    221209-cly4wsca94

  • MD5

    4511a996d718049dc61099e20d9d493a

  • SHA1

    90c7eddf78f3adee3dd32857ac566514c1214403

  • SHA256

    2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190

  • SHA512

    c0ec9c7dca190b1e0363413bea7a550ce84901535c762c397aaea6e239c3370ac774827c17da8fcce9a0a53d097e34526de3f4570aeeee16662cb0c55474d605

  • SSDEEP

    12288:Z9qKPtfbn0yqv+ibXxoyxsUokK6NBi82U8NH92Yhvtoz+89:LVfb++gAkK6TbaNH91hvKz+

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5160627201:AAFqhXgzctTZMSuR7dIpLe50dmHi1xpPyYQ/sendDocument

Targets

    • Target

      2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190

    • Size

      952KB

    • MD5

      4511a996d718049dc61099e20d9d493a

    • SHA1

      90c7eddf78f3adee3dd32857ac566514c1214403

    • SHA256

      2d73db620c8e9011678f6883f0c7b99be35b8637b3cbb65d802031c9239f8190

    • SHA512

      c0ec9c7dca190b1e0363413bea7a550ce84901535c762c397aaea6e239c3370ac774827c17da8fcce9a0a53d097e34526de3f4570aeeee16662cb0c55474d605

    • SSDEEP

      12288:Z9qKPtfbn0yqv+ibXxoyxsUokK6NBi82U8NH92Yhvtoz+89:LVfb++gAkK6TbaNH91hvKz+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks