General

  • Target

    doc10010679052382012143717.img

  • Size

    1.1MB

  • Sample

    230317-jzzqxafa65

  • MD5

    b39e3336180b7f345770ff5b4725ff39

  • SHA1

    3f731651b6c0e2dee3fc9c006ac262f6d2cb068d

  • SHA256

    d32bba142663cd6203437f8295f7825cd552326b4b0fdb026167cb4d19ba9cd7

  • SHA512

    12ee16bfb06487a6077a17f40a3c5653edb669a52d1ed4157e101a671472320920f2989ef8c57b7edeaef9320bdc793ea292add1fe5996795531872a2c888271

  • SSDEEP

    24576:PTbBv5rULmVeLmvdWULotH9NwCLmtmH6opxUPYhLKX5yaU:5BVVgeoULGHjVStmHXxUPYc

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5729374237:AAEdSD-W5rWlJyyU5nwVKvjLxJBT1jTdKRY/

Targets

    • Target

      doc10010679052382012143717.exe

    • Size

      1.0MB

    • MD5

      1df06ea86eaac59f70bfb0644f3ad683

    • SHA1

      91e7dea1ab7bf436fc4837df885f167c1dc91d21

    • SHA256

      34f94d5066b7b34db54d13762f1f3b11ac1b4cdfb971cc822bc3c4d9a7394994

    • SHA512

      0f2cf855ec05185d4fb046f4552d742a14dad9fdf78e58daa4fe77f96b8afbe83f5c97cf2d064bfbcd2ce071a7499226a39dd969edfdeecc4a2129c476b71cd4

    • SSDEEP

      24576:/TbBv5rULmVeLmvdWULotH9NwCLmtmH6opxUPYhLKX5yaUr:JBVVgeoULGHjVStmHXxUPYc2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks