General

  • Target

    z57zoVD1qRVURCdvP.exe

  • Size

    678KB

  • Sample

    230414-p9r2pshh64

  • MD5

    662c2d967791997bb799ca6f6ca39cbc

  • SHA1

    cc8fb5fd40c07b08d050df8399e5662fa9f41114

  • SHA256

    0801817ef1c012615750ffa271d26b484e6460c929c14a87d4a78ffd579ada87

  • SHA512

    d29ae1cbdbca48de53982381121dc3a6c453521bb3a38c1a80d98c667c66ec50d75bcba000c876a3d3dc87a04871fe9c8a84334ca9a17f3678c0633e9227c805

  • SSDEEP

    12288:NRry3ItEaI3IpvGkz3KVVP7lu8ETxHylCdiyFWngXqG3xqO7anaB:Pr1v93U7M8ySElpBqjaB

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6174413593:AAEFJFfmmgKHkg-43MZw2Pt5EAT6z2Bs9Ug/

Targets

    • Target

      z57zoVD1qRVURCdvP.exe

    • Size

      678KB

    • MD5

      662c2d967791997bb799ca6f6ca39cbc

    • SHA1

      cc8fb5fd40c07b08d050df8399e5662fa9f41114

    • SHA256

      0801817ef1c012615750ffa271d26b484e6460c929c14a87d4a78ffd579ada87

    • SHA512

      d29ae1cbdbca48de53982381121dc3a6c453521bb3a38c1a80d98c667c66ec50d75bcba000c876a3d3dc87a04871fe9c8a84334ca9a17f3678c0633e9227c805

    • SSDEEP

      12288:NRry3ItEaI3IpvGkz3KVVP7lu8ETxHylCdiyFWngXqG3xqO7anaB:Pr1v93U7M8ySElpBqjaB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks