General

  • Target

    1399a8cb59c05e00e63f5ba44446557e.bin

  • Size

    544KB

  • Sample

    230511-bdtc1acg7v

  • MD5

    63228ed16bfdf7b31688cb25b37eb89c

  • SHA1

    126c5d32fd38209c5b591493e3a1d1b7b5525a4b

  • SHA256

    408407707c5c00d8a6bab7761a296f7ddefe93e50da7746dab3bb7778631d815

  • SHA512

    7ed5041571f53b32875669a1ad5e4f3a7d4473475a02108dd01186a0a5df37f83d928f21a9151bf61fcfb5684bd8c5a9adbb6e022fc1492d806f998c9a4a5b1e

  • SSDEEP

    12288:GP4lGZt6aB/dXEvRHAHQHJr+LWQOBxFNgLab9m/khnR:k/WadpEQAQOBdXe4

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5635409590:AAHInAR4dWLcsUes3TU8Nj2UQrEubKrXKLs/

Targets

    • Target

      5a224ab3b182f13b491469c57c336848721fd9b3205c7b7905b1d05e5d99aefa.exe

    • Size

      612KB

    • MD5

      1399a8cb59c05e00e63f5ba44446557e

    • SHA1

      593445cc2ad091b367aedd6e4107dfb210375ff3

    • SHA256

      5a224ab3b182f13b491469c57c336848721fd9b3205c7b7905b1d05e5d99aefa

    • SHA512

      c93da49aa0e29da478d74b8b90a27ca3b11c5b50011eec1692eed0794f9ab610c9c05568052e9887e6ad944e688f0e8120fea9620f3f16695d55a37d68aff93b

    • SSDEEP

      12288:CNj5Ay3SHAdvVPz95iez6PGD9Ai22UegR3FTthxezP9YC:C3IHWVpowX9AwUlFTthxCb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks