General

  • Target

    Fatura_SUN202200000166.exe

  • Size

    460KB

  • Sample

    230102-lycabsdh26

  • MD5

    25b24cc692dbff9a944e08722cf67574

  • SHA1

    dedce1680f802b0ddc708ab74eba5cd5f87e658f

  • SHA256

    4dfcba72b64ae285fee5ba43764d81e4c436ce8df68730405c197b5ac69d3698

  • SHA512

    64bc777c16e887e85cb4c8b263fa33589120d7ce77cb94e9c3ed1ad1242954ce3e4c04b544c28335f84ebe18f100d43ed99d59096415e315df303bb3ded255e3

  • SSDEEP

    12288:iY5/tFGdaxnb/4zjXvj5uIG3GpAu8EY9I:iY5/rW6nb/4f/Fm2pVA9I

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5932499274:AAFVgY_mSAbCu0fXfBWMuUmyk56JtTf6--Q/

Targets

    • Target

      Fatura_SUN202200000166.exe

    • Size

      460KB

    • MD5

      25b24cc692dbff9a944e08722cf67574

    • SHA1

      dedce1680f802b0ddc708ab74eba5cd5f87e658f

    • SHA256

      4dfcba72b64ae285fee5ba43764d81e4c436ce8df68730405c197b5ac69d3698

    • SHA512

      64bc777c16e887e85cb4c8b263fa33589120d7ce77cb94e9c3ed1ad1242954ce3e4c04b544c28335f84ebe18f100d43ed99d59096415e315df303bb3ded255e3

    • SSDEEP

      12288:iY5/tFGdaxnb/4zjXvj5uIG3GpAu8EY9I:iY5/rW6nb/4f/Fm2pVA9I

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks