General

  • Target

    tmp

  • Size

    246KB

  • Sample

    230824-q2vy3aed91

  • MD5

    00cdf04e6c1e56772e0181de92a6beb8

  • SHA1

    d7466d629062c492e918d33b031e1cefdf715d49

  • SHA256

    045e8b4f5d4e24a8e6e4f4571a7e1b45d00ffda46f3e33c6551bf10b059beed0

  • SHA512

    1bfe3f2f1e38c58327b7d485783f365eb8931c8cc754025c6b65df3907ecf516baf465d89f09610532389c4f9cfc8e4d2f20e23b149217f8ebe6f2aa7405609d

  • SSDEEP

    3072:ff+VPdDxYsnYQdJxJvTvgE9w7gVRh40XGDNA37:ffWPdtfYQdJxJrvgHUe02DW

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6515773992:AAGxfvtfi52THqf0poVikQjud-DY6wxSlIw/

Targets

    • Target

      tmp

    • Size

      246KB

    • MD5

      00cdf04e6c1e56772e0181de92a6beb8

    • SHA1

      d7466d629062c492e918d33b031e1cefdf715d49

    • SHA256

      045e8b4f5d4e24a8e6e4f4571a7e1b45d00ffda46f3e33c6551bf10b059beed0

    • SHA512

      1bfe3f2f1e38c58327b7d485783f365eb8931c8cc754025c6b65df3907ecf516baf465d89f09610532389c4f9cfc8e4d2f20e23b149217f8ebe6f2aa7405609d

    • SSDEEP

      3072:ff+VPdDxYsnYQdJxJvTvgE9w7gVRh40XGDNA37:ffWPdtfYQdJxJrvgHUe02DW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks