General

  • Target

    3217930a87bf8b38ba8d474862548853.bin

  • Size

    741KB

  • Sample

    230509-bk2mysdf73

  • MD5

    334290ccf4136685b0e2a45cf3025731

  • SHA1

    121ac58e83c3c58b2973b4c3b1228f1e0bb8ac53

  • SHA256

    4a6fbecba1c154986b6a0f6990b1edc22db05aa08908161cb9c9924ed78dac26

  • SHA512

    f45e088979ac8de10fb0b097f13313be96e8655a1824ebd1f6f3b41cbb1c7b3d18c6d3359d1a8c4decef625ba823680ca5d63d363446463e84ee94b9c40d24e6

  • SSDEEP

    12288:DXGI1vusIvqzEFQv1wJ8+fyK5n+kEzeEluowhiB:TG0tHEagfvwkEJl2hu

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5641589629:AAE7PbYkX7JPIEd1r5HHvkG2FiDsJ1HpC0c/

Targets

    • Target

      7170058dac6c9006c7fd6273b4a824277cbac873f61c117b22279ce0cd425b62.exe

    • Size

      962KB

    • MD5

      3217930a87bf8b38ba8d474862548853

    • SHA1

      3ffc1d60ad13db9a291f03b0f8ff35c0281e7d5d

    • SHA256

      7170058dac6c9006c7fd6273b4a824277cbac873f61c117b22279ce0cd425b62

    • SHA512

      295b41f2035888446230a29f214cdfcc78d93eab3f1720387997b16630bda3698b4f3dabd31b4cbf79dc2d319d8cfb59b442ec2c72c74afec1e3b6143a91112f

    • SSDEEP

      24576:R7Q12srPK7afcfX/9e4+l2gNG82VDkB0+9ud:R+Iafcle4U2gNGnYB0z

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks