General

  • Target

    P30OwbdhQCNt5HS.exe

  • Size

    698KB

  • Sample

    230504-htzy2scd7x

  • MD5

    43678482751038f9a87f50b0dc8e2f15

  • SHA1

    2735a27a9ba8de920eca46637c974b686bc2d20b

  • SHA256

    109ef5c322e2f5b9624f14914d4e4db3cd2ee7883f9c718c913616eb69277091

  • SHA512

    4ebaae9d12e72102fcbe374edd0f880e041485a3ccc802cee17c145ddf4ce7f221fc06a736b1a0096081b0bb9d854f6ef4699ab41424287a2be9060249865b46

  • SSDEEP

    12288:1BAni4Iyett3RbH/ZvlydI1tWHURMcSRV9ZUasth5KwQyX:1aWtxH/ZttRq9ZSK

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6190932047:AAFAXC_q-J_1tPTmmiqndMdlZipgoGT2Ypo/

Targets

    • Target

      P30OwbdhQCNt5HS.exe

    • Size

      698KB

    • MD5

      43678482751038f9a87f50b0dc8e2f15

    • SHA1

      2735a27a9ba8de920eca46637c974b686bc2d20b

    • SHA256

      109ef5c322e2f5b9624f14914d4e4db3cd2ee7883f9c718c913616eb69277091

    • SHA512

      4ebaae9d12e72102fcbe374edd0f880e041485a3ccc802cee17c145ddf4ce7f221fc06a736b1a0096081b0bb9d854f6ef4699ab41424287a2be9060249865b46

    • SSDEEP

      12288:1BAni4Iyett3RbH/ZvlydI1tWHURMcSRV9ZUasth5KwQyX:1aWtxH/ZttRq9ZSK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks