General

  • Target

    2036-60-0x0000000000CC0000-0x0000000000CF0000-memory.dmp

  • Size

    192KB

  • Sample

    230330-jctldabe48

  • MD5

    2c4963c5c01c91ec061281279e8b7e37

  • SHA1

    d3aebc579936b7762946921714dc59471a23126b

  • SHA256

    f3eee827ad2d19428712490f6e80f57d9938bbe451740f9865c845ac4b9e3d1f

  • SHA512

    e8823d721caac1392c87a2e203e89be4bbe2dc79471bb3e6ddc7f91aa7e072dfde0de6e85449a42cff2c2a2c68e8c6d48433a24e5a3c1693c0f1d38643110f2e

  • SSDEEP

    3072:4Y5hpLwND0Ns1XjlCnGVhX5ehkDBkDoZAk98HsNeK6lmLte:7wND+OTEnGVhpQ8rAk99oAt

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1072117881577406594/JnwMG6U7oVKsTsetdtODjp1Ew1QCfgcuQBg_-TMcoYdCQQhQBZj_35Q_xMVrJpK8f_cG

Targets

    • Target

      2036-60-0x0000000000CC0000-0x0000000000CF0000-memory.dmp

    • Size

      192KB

    • MD5

      2c4963c5c01c91ec061281279e8b7e37

    • SHA1

      d3aebc579936b7762946921714dc59471a23126b

    • SHA256

      f3eee827ad2d19428712490f6e80f57d9938bbe451740f9865c845ac4b9e3d1f

    • SHA512

      e8823d721caac1392c87a2e203e89be4bbe2dc79471bb3e6ddc7f91aa7e072dfde0de6e85449a42cff2c2a2c68e8c6d48433a24e5a3c1693c0f1d38643110f2e

    • SSDEEP

      3072:4Y5hpLwND0Ns1XjlCnGVhX5ehkDBkDoZAk98HsNeK6lmLte:7wND+OTEnGVhpQ8rAk99oAt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks