General

  • Target

    B308FE5CBA6335BC1EE3E1F7F2ACC5A836F5F791208475A528366EDD19ADABD9

  • Size

    760KB

  • Sample

    230208-v19haacg31

  • MD5

    4b33f8195239e181df4b33bad3e59047

  • SHA1

    4fa27e2f7a90b6e18355c98b160cecdf18426f54

  • SHA256

    b308fe5cba6335bc1ee3e1f7f2acc5a836f5f791208475a528366edd19adabd9

  • SHA512

    4259f458b5b4b400e6903aea74e46a8a12791e896af9ecd3c61bddea662ee8ce9949d19e87a795fa00a13e8e9544542de8fa2a3536e542e7b057c7c439dc031b

  • SSDEEP

    12288:Ch/yK5U5JKVSlabiFldrzBn/9whFQb93EdRGCmUW8CnoXQNW3CnAjYq:Ch/JShxrXwhF/mJnoXQNIOAjN

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5607774642:AAHvNRvZZsOklHgBMuIBbK4hzkG26fMwVX8/

Targets

    • Target

      HBL-TXCEB221133921.exe

    • Size

      924KB

    • MD5

      8cc30536cf5cb034f58101ac6c5d5f30

    • SHA1

      eb4d6e97c32801948b80952311a38a34552f5e7f

    • SHA256

      f2dd1ea5092a534e3f8a79a21fa0e46da7d5d3a0a71b9945a7c6278c0431b79e

    • SHA512

      c42ae9b32097e3a1b00125e365e730cbe26eff4a53c3254d44cc68a06aa2a8eedea01855831519a13eb1f8db954d475dc0036c29dce43571a60de5f6062c2804

    • SSDEEP

      12288:FaS45nJrTmHkFrVr/9qvDGB9HEvhACmUQ8gneXQjWl2aaqnm:oS4PkkFrjqvDPqlneXQj7im

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks