General

  • Target

    dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e

  • Size

    792KB

  • Sample

    230608-pv75dafd45

  • MD5

    b038b4d1fbbab60fc94b46d6e244932c

  • SHA1

    cecbc91cddb4451de243f5a07cea733c994ceec4

  • SHA256

    dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e

  • SHA512

    e9da36d4cf4e2b8369fd368a4fc7fc6408b8f8030860b67cc5f9f082f3dfcd59c61f56c4679c9465a24b43a7deb471971f47706927d0f135bc2276400238d751

  • SSDEEP

    12288:s/2B0xTGlxNqvNu2hZ+nUEsn9tyNSJCbqixpDvYp11z3NBWXKxVx4ra4yjSqTvFC:s/LaVUH999ggCbqijsRz3yrdyWW/s

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5607774642:AAHvNRvZZsOklHgBMuIBbK4hzkG26fMwVX8/

Targets

    • Target

      dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e

    • Size

      792KB

    • MD5

      b038b4d1fbbab60fc94b46d6e244932c

    • SHA1

      cecbc91cddb4451de243f5a07cea733c994ceec4

    • SHA256

      dab636a81ff0ed263531e7984977366336b9f194c170406c8b145db5711c9d8e

    • SHA512

      e9da36d4cf4e2b8369fd368a4fc7fc6408b8f8030860b67cc5f9f082f3dfcd59c61f56c4679c9465a24b43a7deb471971f47706927d0f135bc2276400238d751

    • SSDEEP

      12288:s/2B0xTGlxNqvNu2hZ+nUEsn9tyNSJCbqixpDvYp11z3NBWXKxVx4ra4yjSqTvFC:s/LaVUH999ggCbqijsRz3yrdyWW/s

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks