General

  • Target

    a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be

  • Size

    266KB

  • Sample

    230808-q2vnased81

  • MD5

    27082c3c39a5676feb8bd06259a62986

  • SHA1

    3b71575eb1f20d9891193f22cbc48c0c2ebf3006

  • SHA256

    a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be

  • SHA512

    b2aa0a323e2d26cb754941d8a003d3718b0f3fbf9fbc0efad202984d91a8d4d496a73ab617a000dcc82c90210ab78670ca8edcc538ba1f9d6a7644dae54ea336

  • SSDEEP

    6144:vYa6nu8pnYbVHcHyhjGW7gyCW6Ao0DyAYXN/OLa/TX:vY9u8pYhHwEjGwgDW+N/ca/TX

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5332188518:AAGLqzDNvYFhN8XTUFMm6M56kO3XMfpkjIw/

Targets

    • Target

      a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be

    • Size

      266KB

    • MD5

      27082c3c39a5676feb8bd06259a62986

    • SHA1

      3b71575eb1f20d9891193f22cbc48c0c2ebf3006

    • SHA256

      a41a510e1b3347f7d73eef2ba37cc1b2345cb77f8063e5632af9695ead6f36be

    • SHA512

      b2aa0a323e2d26cb754941d8a003d3718b0f3fbf9fbc0efad202984d91a8d4d496a73ab617a000dcc82c90210ab78670ca8edcc538ba1f9d6a7644dae54ea336

    • SSDEEP

      6144:vYa6nu8pnYbVHcHyhjGW7gyCW6Ao0DyAYXN/OLa/TX:vY9u8pYhHwEjGwgDW+N/ca/TX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks