General

  • Target

    643a5f5c2522976a646e7f6129494937.bin

  • Size

    569KB

  • Sample

    230511-b2v7habb24

  • MD5

    7343dea5d21afc6043b724bc94462fdf

  • SHA1

    10325f1bb670bcfe68349b0ac2b8bc64d6a23f64

  • SHA256

    4e386dbbbe2dcb83e680b0e28750318b9d8db872419787e2a569da09571cdf9d

  • SHA512

    ec46dfde06176bae0ba269ebf41621b5f24185b9ea4236d0a18f480a76ebabe08f1e1a381632da9b65e39e413798d597d2caea683855dff6615c2d1d88400810

  • SSDEEP

    12288:gf9lIXtGuhtzdOfbzBuhmrryQQgq5MunMq4Omfu7NcSUaLBUwIhwv9pi:gfHIXtDh9dGbzBKmqQQYunYOmW7TTi

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6146448630:AAFDNJNL6_ijRm3JFXG4wLYsktTk9DjETWM/

Targets

    • Target

      529bb27de4876e215a65d62f1166d244bf8d16396a4cae982af3900260bd68e9.exe

    • Size

      694KB

    • MD5

      643a5f5c2522976a646e7f6129494937

    • SHA1

      bd6eb5576677df1727cf6faf8a578ea7fd07be0d

    • SHA256

      529bb27de4876e215a65d62f1166d244bf8d16396a4cae982af3900260bd68e9

    • SHA512

      961ad6608c1b35c1eb2649b2199e1da629291e7ffaa6ba957151779313441713ef1c22903df5a2e498682a56ad6b69d1c798039184a9e6847f506612d6bc9ca8

    • SSDEEP

      12288:qPOAAZf7AkNriQ6utjxgm8ozBqMi9qjjWaCreqJE9bGa+I104cO:q2kil6utdd8ozZ4VreeIbGan04z

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks