General

  • Target

    Inquiry_Specifications.exe

  • Size

    589KB

  • Sample

    230629-zga8lafg8v

  • MD5

    3e2eea13f28c03ad22f0bc5b2e697f36

  • SHA1

    b09f33d0433fb28b47a9ad3af56b880410aea6cb

  • SHA256

    be916bff213eaafdb32c19caa4c4f95181c4ff9cdf20ba3d99905a9c2360ab41

  • SHA512

    720723dbb6a5e1f12fea7a6a9184b64068e66620d8ffc7cbc2f0a9a832c7644e3ed7ba3e9d662676e0ae02a97280e5fb4c20f31a57e3aa68109c21ddf6c3c7e3

  • SSDEEP

    12288:1YUpZnmpdsU/HRYUHEWSU1Cm3Dv5lUvlNDQ194:1YhsA6UYU1C2NlUTQ1C

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5349655878:AAGnMhpzchQYN5RbZ88-w3gvA1SNsxWo7ts/

Targets

    • Target

      Inquiry_Specifications.exe

    • Size

      589KB

    • MD5

      3e2eea13f28c03ad22f0bc5b2e697f36

    • SHA1

      b09f33d0433fb28b47a9ad3af56b880410aea6cb

    • SHA256

      be916bff213eaafdb32c19caa4c4f95181c4ff9cdf20ba3d99905a9c2360ab41

    • SHA512

      720723dbb6a5e1f12fea7a6a9184b64068e66620d8ffc7cbc2f0a9a832c7644e3ed7ba3e9d662676e0ae02a97280e5fb4c20f31a57e3aa68109c21ddf6c3c7e3

    • SSDEEP

      12288:1YUpZnmpdsU/HRYUHEWSU1Cm3Dv5lUvlNDQ194:1YhsA6UYU1C2NlUTQ1C

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks