General

  • Target

    69be1ecad83bd419977aefd1e8777332.exe

  • Size

    956KB

  • Sample

    221210-kyxetsfc58

  • MD5

    69be1ecad83bd419977aefd1e8777332

  • SHA1

    7d6e37043d3bbe0a2b1099ab22bc58e2628ad2b8

  • SHA256

    626b38eceda55688275aec055e69b4cfbf2853b6e3d32e7ad0dfee6f1873fc02

  • SHA512

    e61df9fed3c55b1242890b9f5457f085eaf11e229e8fa54aa7af2179dbf242e61e7e5b5e235cd4907e7791daf7a789f0d408f910fb7265e5f71b10dfb26f5b4d

  • SSDEEP

    12288:b28yFT7GPtdUAG/mZoIms2jIEIX1uXnbT9LfeUi0wHv9gpY+ZmBjHUk+qjK3o3:q8MTql9GoWs2jICdfeUU9AhZmBHE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      69be1ecad83bd419977aefd1e8777332.exe

    • Size

      956KB

    • MD5

      69be1ecad83bd419977aefd1e8777332

    • SHA1

      7d6e37043d3bbe0a2b1099ab22bc58e2628ad2b8

    • SHA256

      626b38eceda55688275aec055e69b4cfbf2853b6e3d32e7ad0dfee6f1873fc02

    • SHA512

      e61df9fed3c55b1242890b9f5457f085eaf11e229e8fa54aa7af2179dbf242e61e7e5b5e235cd4907e7791daf7a789f0d408f910fb7265e5f71b10dfb26f5b4d

    • SSDEEP

      12288:b28yFT7GPtdUAG/mZoIms2jIEIX1uXnbT9LfeUi0wHv9gpY+ZmBjHUk+qjK3o3:q8MTql9GoWs2jICdfeUU9AhZmBHE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks