General

  • Target

    34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a

  • Size

    1.8MB

  • Sample

    230214-xm6wcaeh3w

  • MD5

    20f53a9142c57034486e53e5bd338fd3

  • SHA1

    89320dfb38d2e1f197e11ba82345ac0892ee9f7f

  • SHA256

    34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a

  • SHA512

    9ef13d212023aad4217827f35def6a2c137d41b2804c927d5ca24a6245d524cf77391d57eb24d9fc01ce70315ef017596c7fd57ebcae12c6d5f9d466ed09fc05

  • SSDEEP

    24576:ga4DeDaAyXWZagcHPhSeTBIqq4xA1XrNiR9GQCj:ga4DeDapXwagcHvBAGr0

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5479139811:AAFjvrIBMkhtgUmULA2dMcFBI3ifYLrXZAc/

Targets

    • Target

      34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a

    • Size

      1.8MB

    • MD5

      20f53a9142c57034486e53e5bd338fd3

    • SHA1

      89320dfb38d2e1f197e11ba82345ac0892ee9f7f

    • SHA256

      34f8317c88180f1c229d69b940838a794b80ea6dcbdf0082e01720177adb468a

    • SHA512

      9ef13d212023aad4217827f35def6a2c137d41b2804c927d5ca24a6245d524cf77391d57eb24d9fc01ce70315ef017596c7fd57ebcae12c6d5f9d466ed09fc05

    • SSDEEP

      24576:ga4DeDaAyXWZagcHPhSeTBIqq4xA1XrNiR9GQCj:ga4DeDapXwagcHvBAGr0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks