General

  • Target

    INVOICE.exe

  • Size

    996KB

  • Sample

    230630-ptl6hsbf97

  • MD5

    f1a3492ad9b9f7134c4954a565478e6f

  • SHA1

    276950b89f2a9a0b1689d4aa14f6604075c2bd44

  • SHA256

    cef9ee760a9e4e3d132a05164243a878622db8cb86d26753e10a4430312d3486

  • SHA512

    6f0bbaaca449f188716ba1643535f6edc85fe1510e6a2c190952158e502774384d5a7532172a320fb8c204377a249e79b791f0a3487863d9e43b28f2fff02adc

  • SSDEEP

    12288:IrBk763UvVOD4vNfHs+w2AEOUdS6B7R2xuSH5MfPboK8:IruoU9lF42omQxu1Hg

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6048733251:AAHRY3bwFxY_dCpUKVaxkoIu25MIjLFtqRA/

Targets

    • Target

      INVOICE.exe

    • Size

      996KB

    • MD5

      f1a3492ad9b9f7134c4954a565478e6f

    • SHA1

      276950b89f2a9a0b1689d4aa14f6604075c2bd44

    • SHA256

      cef9ee760a9e4e3d132a05164243a878622db8cb86d26753e10a4430312d3486

    • SHA512

      6f0bbaaca449f188716ba1643535f6edc85fe1510e6a2c190952158e502774384d5a7532172a320fb8c204377a249e79b791f0a3487863d9e43b28f2fff02adc

    • SSDEEP

      12288:IrBk763UvVOD4vNfHs+w2AEOUdS6B7R2xuSH5MfPboK8:IruoU9lF42omQxu1Hg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks