General

  • Target

    8bf173aff4199d406af58097f9a02434.bin

  • Size

    727KB

  • Sample

    230518-bg8l4afh81

  • MD5

    8bf173aff4199d406af58097f9a02434

  • SHA1

    95bf3e1a2ba4c7b7992e4aa7e3291fca187b50a8

  • SHA256

    ed9248192c85ed4a3053e0c5bf1763cb1e39ed9514122a29542e439461c89f9b

  • SHA512

    ff3436ff08dd861b8868f996e548337ef5b644fe3e2dbb007e925fda6f26740382c81e01d19ba7dc8387ed594a3c0bf408f8e535e0874a4783fed85fa9a16b65

  • SSDEEP

    12288:vf1Z6SljSn+1fyjVsjQbM+AqVX5zspuvwQ:n1Z5PfyjG8I+PzYKwQ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8bf173aff4199d406af58097f9a02434.bin

    • Size

      727KB

    • MD5

      8bf173aff4199d406af58097f9a02434

    • SHA1

      95bf3e1a2ba4c7b7992e4aa7e3291fca187b50a8

    • SHA256

      ed9248192c85ed4a3053e0c5bf1763cb1e39ed9514122a29542e439461c89f9b

    • SHA512

      ff3436ff08dd861b8868f996e548337ef5b644fe3e2dbb007e925fda6f26740382c81e01d19ba7dc8387ed594a3c0bf408f8e535e0874a4783fed85fa9a16b65

    • SSDEEP

      12288:vf1Z6SljSn+1fyjVsjQbM+AqVX5zspuvwQ:n1Z5PfyjG8I+PzYKwQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks