General

  • Target

    03549299.exe

  • Size

    787KB

  • Sample

    230528-km7resfb6z

  • MD5

    4856aa91b3b25dc702acee5419906c0d

  • SHA1

    ede60a132a27265595f8744a44ea13f371357d08

  • SHA256

    0140ef4dd7bd4b560548e2b9f74ae66006efc7d0e0b3b017251f755bbd8b601c

  • SHA512

    eb74fa093c1ae40ce7cdb51fa0afbb7f849f90e496ce6bac0732dfe6a9307c28fdb1ab953e4b732b358a8fe6597a2937f6ab5b211cc3e5a6305dfe48bc0189d5

  • SSDEEP

    12288:TJas7z5GoJiGaq5aulLfqPoSCccNJzT5Fkjy6v6z4TgnnFxZAY6gvCd41x:I65GoR5ambqPo7Bk+6v6kTgFxiVd41

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument

Targets

    • Target

      03549299.exe

    • Size

      787KB

    • MD5

      4856aa91b3b25dc702acee5419906c0d

    • SHA1

      ede60a132a27265595f8744a44ea13f371357d08

    • SHA256

      0140ef4dd7bd4b560548e2b9f74ae66006efc7d0e0b3b017251f755bbd8b601c

    • SHA512

      eb74fa093c1ae40ce7cdb51fa0afbb7f849f90e496ce6bac0732dfe6a9307c28fdb1ab953e4b732b358a8fe6597a2937f6ab5b211cc3e5a6305dfe48bc0189d5

    • SSDEEP

      12288:TJas7z5GoJiGaq5aulLfqPoSCccNJzT5Fkjy6v6z4TgnnFxZAY6gvCd41x:I65GoR5ambqPo7Bk+6v6kTgFxiVd41

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks