General

  • Target

    1cd1f5ab76966f57655f53e59b4d210ece1338051884e1fbe167e99020fc7ce4.exe

  • Size

    741KB

  • Sample

    230706-qqm43sbe72

  • MD5

    001b7651a94515271267d93b3ad099a4

  • SHA1

    babed1b681f923723a3f9a287633607ec8d40ffd

  • SHA256

    1cd1f5ab76966f57655f53e59b4d210ece1338051884e1fbe167e99020fc7ce4

  • SHA512

    216d8a4391282938392685d84b8e1bd20c286b50525e544c9f1ab5d8ef6d147a51fe904cc3d213d57a7dbcb3df8a1b692b064b8ec24066c3ab98ee371f999fea

  • SSDEEP

    12288:h92iNyOe42KMu/N3mWhQmwmJCMpUgZxDRHwBSzj+A+t/Rn/lQupjJ3pTKk6CYqAj:/1wOV/NOa7ZZRHvzWzn/lQulTX6CFA7

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1cd1f5ab76966f57655f53e59b4d210ece1338051884e1fbe167e99020fc7ce4.exe

    • Size

      741KB

    • MD5

      001b7651a94515271267d93b3ad099a4

    • SHA1

      babed1b681f923723a3f9a287633607ec8d40ffd

    • SHA256

      1cd1f5ab76966f57655f53e59b4d210ece1338051884e1fbe167e99020fc7ce4

    • SHA512

      216d8a4391282938392685d84b8e1bd20c286b50525e544c9f1ab5d8ef6d147a51fe904cc3d213d57a7dbcb3df8a1b692b064b8ec24066c3ab98ee371f999fea

    • SSDEEP

      12288:h92iNyOe42KMu/N3mWhQmwmJCMpUgZxDRHwBSzj+A+t/Rn/lQupjJ3pTKk6CYqAj:/1wOV/NOa7ZZRHvzWzn/lQulTX6CFA7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks