General

  • Target

    2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe

  • Size

    358KB

  • Sample

    221209-yt921sha5w

  • MD5

    7db0bc0c978bda0048ac2944b9b86245

  • SHA1

    66e87764ff09ebba04681cbc2c61a43cbfa595b5

  • SHA256

    2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063

  • SHA512

    a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb

  • SSDEEP

    6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5801961827:AAHU2YhkfiXQwgVf7WnbO6mcJG_3zpTOec4/

Targets

    • Target

      2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe

    • Size

      358KB

    • MD5

      7db0bc0c978bda0048ac2944b9b86245

    • SHA1

      66e87764ff09ebba04681cbc2c61a43cbfa595b5

    • SHA256

      2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063

    • SHA512

      a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb

    • SSDEEP

      6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks