General

  • Target

    detail lengkap transaksi.exe

  • Size

    1.1MB

  • Sample

    230206-eqr79aca57

  • MD5

    61fb9f5b2fe2261dc2143ef1c88a52bd

  • SHA1

    e1d6bd5e3da2969e5424716bd9acb1c9bfe5bb68

  • SHA256

    aa9680b982b96bce1ab425e2b7f18ea951a832a2c18bba1f6880381a7610bf68

  • SHA512

    91b78556bff7af21862b7d81384c0c110a76c24ac7fe6d3beb0b26e77fa1a6e6851f4ee64b90a8345b6858810b4f636d679aa3fe76e12967067d828ea332ff5c

  • SSDEEP

    24576:iA3QrxN5IC54TWMj+uIemAAk0EyYEMjdYYuA9H:18tgiq+bemA/rEMjdxuAV

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      detail lengkap transaksi.exe

    • Size

      1.1MB

    • MD5

      61fb9f5b2fe2261dc2143ef1c88a52bd

    • SHA1

      e1d6bd5e3da2969e5424716bd9acb1c9bfe5bb68

    • SHA256

      aa9680b982b96bce1ab425e2b7f18ea951a832a2c18bba1f6880381a7610bf68

    • SHA512

      91b78556bff7af21862b7d81384c0c110a76c24ac7fe6d3beb0b26e77fa1a6e6851f4ee64b90a8345b6858810b4f636d679aa3fe76e12967067d828ea332ff5c

    • SSDEEP

      24576:iA3QrxN5IC54TWMj+uIemAAk0EyYEMjdYYuA9H:18tgiq+bemA/rEMjdxuAV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks