General

  • Target

    ebba07aa50ddef78d9686de42b4db3dc.bin

  • Size

    498KB

  • Sample

    230419-cra91she6v

  • MD5

    7829db7a196907583de00f86c11de131

  • SHA1

    41962cd29d3d43afa03b1f92ff8997cf28d23962

  • SHA256

    10ac73fe223456e4b0b42d8c4e9bd628910246e1f40b7303611105b3db0bb94e

  • SHA512

    75d0e096f110ec1e16e570cead66984b9629c3150aa06deda65ec8041ca0ce6a3ac5f07a1b89e37a1f85f98055fa66a85cd25d999f71aef2f58a366001b6a7ae

  • SSDEEP

    12288:sFq3BhKhLwyKIMThZpNx1+9hMjVs44U+oet/17/+4vi7:sF+hKFwJFZp10wh4UAtdr+kS

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6191932863:AAEw6WZfMHSbIiilSKsmAnJOgaZwvnoMVh8/

Targets

    • Target

      d5d18f9417c9f5268a707e6c276d8318f0bc399302ff07d8d8319257c9dac063.exe

    • Size

      562KB

    • MD5

      ebba07aa50ddef78d9686de42b4db3dc

    • SHA1

      8060a6eb32751bf7d909e0e5d25094a9c8fd7bbd

    • SHA256

      d5d18f9417c9f5268a707e6c276d8318f0bc399302ff07d8d8319257c9dac063

    • SHA512

      9e3f8656d4eb07f4c6ef38d1c570c8ee66e7123f67cbf6bf0ae833dcfd66f8841bcaa653a5f4ffd7c4176992751490fb32f9dd31a196a9379c7a075f2e4a4f12

    • SSDEEP

      12288:JAOvIzAPbIs69NzYDdGi3y9p2L7iDu6pgbeSHtXqjfXiLsHiJI:JAC356X8DdhiT2UuTJHtAfXiVI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks