General

  • Target

    94167c7ed417035468f22aeffc07431a.zip

  • Size

    15KB

  • Sample

    230504-ms56wsbg49

  • MD5

    57a08fc5e9c4b57902fb805d9efbe254

  • SHA1

    4e6952e87351379f7f9f7854d71cb371222e3fef

  • SHA256

    1d8f53d9c947af2e65cc63fa48539c2917315016284d201519594cff72a8f438

  • SHA512

    e4b2553841bd33faae1760525e6470fe98ee15c67764aff97c889d39cb504655a6a7a01755c08a440f40ba666c4101f06a46c8b91f4e57ccbc264df7956b3cf1

  • SSDEEP

    384:n/mT8hUPCM2AfDNWS3xUr7DW7/uo9wd0K/amEWM+km+Em:/5eCM2bS3xW7R2WtTMHfp

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      94167c7ed417035468f22aeffc07431a

    • Size

      31KB

    • MD5

      94167c7ed417035468f22aeffc07431a

    • SHA1

      f0949fac7cfc6f1448f406f19cd8133a97ea7589

    • SHA256

      42a82b5198d7fd5275b88d6f582d1d968b774e4a5c248bbd1d1432ec63260ed0

    • SHA512

      9bcf2f08cf74f178946f375f82a16c37befea5f806829a81705bee5266b235c6df33ff0b1241d4573eef45ccbab2f1fc49c91161d88ec0a9f0d931f9d6c8fb39

    • SSDEEP

      768:rFx0XaIsnPRIa4fwJMLccf1Sup3YY9sv2eHd/Nm:rf0Xvx3EMQiS4YY9svi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks