General

  • Target

    shippingdocumentsPO4thcon.exe

  • Size

    488KB

  • Sample

    230704-re9pdafd5x

  • MD5

    b5790577b0b5569b7deca9fbdb7c800a

  • SHA1

    b60b70ac5c3a14ba1e3cfd919050db6756711bcf

  • SHA256

    2be1be21688128f7fc05cdcfab69adc794d39910af884a9e63f920e415dc1657

  • SHA512

    b7efd9dae680bb3137bf68a6aabd9f3486776d9bfbf8c9ef31192bf6183685e7a7839047adb8153eaa609ea7dc5b78776ee745c699ce5579bcf2f982bf7af144

  • SSDEEP

    12288:HjvBe0cK1r1Jj1dSrCLh84IBKLOsiBPHW41M5:Hte0cyj7fh84M2OHfY

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6152671361:AAFL6hvnVRgXVOmTmyt-OBqBcWIytTVfN9M/

Targets

    • Target

      shippingdocumentsPO4thcon.exe

    • Size

      488KB

    • MD5

      b5790577b0b5569b7deca9fbdb7c800a

    • SHA1

      b60b70ac5c3a14ba1e3cfd919050db6756711bcf

    • SHA256

      2be1be21688128f7fc05cdcfab69adc794d39910af884a9e63f920e415dc1657

    • SHA512

      b7efd9dae680bb3137bf68a6aabd9f3486776d9bfbf8c9ef31192bf6183685e7a7839047adb8153eaa609ea7dc5b78776ee745c699ce5579bcf2f982bf7af144

    • SSDEEP

      12288:HjvBe0cK1r1Jj1dSrCLh84IBKLOsiBPHW41M5:Hte0cyj7fh84M2OHfY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks