General

  • Target

    774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85

  • Size

    929KB

  • Sample

    230607-waqsxsec6v

  • MD5

    b06ae1e6eeceff98d9996b7672219b4c

  • SHA1

    14a5e0901d86ce08420c4895218de9d9bded680f

  • SHA256

    774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85

  • SHA512

    f2811d4a346cb2e8aaf63932a6b7194654f03bcf0479f18c7142c07d7af920b3d07632dc3e34a8f1db53655707c23828f6e6b6a6a305550bbf6e12cf54b2db71

  • SSDEEP

    24576:p1Bs0qZ4zlRdHZm7jNTP73VRe4P+JuleeTf7:pDs0qZW7ZmFRRvPXD

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot2124462934:AAGr-L06waDdFGpnKJz3_DCOFcJpWDQ7WIM/sendDocument

Targets

    • Target

      774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85

    • Size

      929KB

    • MD5

      b06ae1e6eeceff98d9996b7672219b4c

    • SHA1

      14a5e0901d86ce08420c4895218de9d9bded680f

    • SHA256

      774acfc7dde64a61752bacbab9f4dc9702dc52a90ee4915b18178c39cbe55e85

    • SHA512

      f2811d4a346cb2e8aaf63932a6b7194654f03bcf0479f18c7142c07d7af920b3d07632dc3e34a8f1db53655707c23828f6e6b6a6a305550bbf6e12cf54b2db71

    • SSDEEP

      24576:p1Bs0qZ4zlRdHZm7jNTP73VRe4P+JuleeTf7:pDs0qZW7ZmFRRvPXD

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks