General

  • Target

    Curriculum Vitae CV Lic H&S Olivetti Renzo.exe

  • Size

    760KB

  • Sample

    230213-rk197adf87

  • MD5

    c49840031b2feedc67e64e4472d851fc

  • SHA1

    8afc913418607659183b720ee522b37125b6ac9b

  • SHA256

    55feee9337b7e9c4a83a4d45257ffed5c7afd479a0144dc47444bd05f71e9803

  • SHA512

    24536d9ac1b75226eb05664df03790622509d65b5b4f42f3a0335f7f3ae13d4a5ddef1f374600de1b68e3814f20309a8669543a6a8a5de2661b9056da09d2751

  • SSDEEP

    12288:Dh6q6EMdYC0ND571Vd86WhN3C5iTbQjn5PHIj24uXvLxKXjt1RgHPNvwvC3OUceG:DYXzQ57jZY0i/QjGbufLxKTt1KHPNvh6

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6185777927:AAHgIPLnq4XW3y12Thl5pKU-tZT6-UNtnfM/

Targets

    • Target

      Curriculum Vitae CV Lic H&S Olivetti Renzo.exe

    • Size

      760KB

    • MD5

      c49840031b2feedc67e64e4472d851fc

    • SHA1

      8afc913418607659183b720ee522b37125b6ac9b

    • SHA256

      55feee9337b7e9c4a83a4d45257ffed5c7afd479a0144dc47444bd05f71e9803

    • SHA512

      24536d9ac1b75226eb05664df03790622509d65b5b4f42f3a0335f7f3ae13d4a5ddef1f374600de1b68e3814f20309a8669543a6a8a5de2661b9056da09d2751

    • SSDEEP

      12288:Dh6q6EMdYC0ND571Vd86WhN3C5iTbQjn5PHIj24uXvLxKXjt1RgHPNvwvC3OUceG:DYXzQ57jZY0i/QjGbufLxKTt1KHPNvh6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks