General

  • Target

    5eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0

  • Size

    790KB

  • Sample

    230826-hp3t5sgg28

  • MD5

    07926f7473fff4bb9d41b460cb71b550

  • SHA1

    fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8

  • SHA256

    5eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0

  • SHA512

    c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf

  • SSDEEP

    24576:8cagQESvORWys6JLfRGFyVnjo9i0T3I/NXQSXbHSp:8ZgQd6xZGF9KVAEbH4

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      5eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0

    • Size

      790KB

    • MD5

      07926f7473fff4bb9d41b460cb71b550

    • SHA1

      fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8

    • SHA256

      5eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0

    • SHA512

      c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf

    • SSDEEP

      24576:8cagQESvORWys6JLfRGFyVnjo9i0T3I/NXQSXbHSp:8ZgQd6xZGF9KVAEbH4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks