General

  • Target

    1801352a0ee7b4e34fb7fe6b484852c57cf33a0e879701c896d442fb2bafcd47.exe

  • Size

    718KB

  • Sample

    230514-lzgw7sdh2t

  • MD5

    86e0ff491e77e336e024f84fe43446c9

  • SHA1

    936278349d8672456f57469befc8d39e9aea72bb

  • SHA256

    1801352a0ee7b4e34fb7fe6b484852c57cf33a0e879701c896d442fb2bafcd47

  • SHA512

    8de086ccbd4095cadb963958d6b8f5236df1abd0ca422c5f03f06fbe1c0307a1c6299d509ba66f1270c817436339be7803a3db87915011a7509d57a81037706b

  • SSDEEP

    12288:bs2iNRjK1NyUIAy9YlhCgkfPxzvc3hXdLY6rfBQ+j/bNIPyVgh2eV:Q1n2pZl9UPx7YhXD++Ns

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1801352a0ee7b4e34fb7fe6b484852c57cf33a0e879701c896d442fb2bafcd47.exe

    • Size

      718KB

    • MD5

      86e0ff491e77e336e024f84fe43446c9

    • SHA1

      936278349d8672456f57469befc8d39e9aea72bb

    • SHA256

      1801352a0ee7b4e34fb7fe6b484852c57cf33a0e879701c896d442fb2bafcd47

    • SHA512

      8de086ccbd4095cadb963958d6b8f5236df1abd0ca422c5f03f06fbe1c0307a1c6299d509ba66f1270c817436339be7803a3db87915011a7509d57a81037706b

    • SSDEEP

      12288:bs2iNRjK1NyUIAy9YlhCgkfPxzvc3hXdLY6rfBQ+j/bNIPyVgh2eV:Q1n2pZl9UPx7YhXD++Ns

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks