General

  • Target

    716aec1f95797296faea4ecd447460c3.dat

  • Size

    607KB

  • Sample

    230917-ms49lacc23

  • MD5

    716aec1f95797296faea4ecd447460c3

  • SHA1

    9ec57fea6463e0eb57b0af11d83ff37a98298b08

  • SHA256

    a7720d9c99b8af7fa344abd0bd8c03651058765dd2599af1e49edccefc51bc3e

  • SHA512

    fcbb8fdbf776eb8503706aa5f2a66a65ec1db978e6c9bbe44834dfb67988f3415dadd8e5638c08f05a33fdbf7c930e954e065b25f55f03ba0047fb88f329433c

  • SSDEEP

    12288:ZPXOVL4UUTV8FGmghbsOTh5RWWI8RMnXrJUsLBmpc8VZt9lRNQyq1DJK4c:ZPXOVcUUTGZghbsWasqXrJUsd6Xt9lv9

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Quotation.exe

    • Size

      693KB

    • MD5

      3cbf764a1a2e7ef8b67e3866440ef5b2

    • SHA1

      459444abc519fb5611bb9821cb8dadb427709f68

    • SHA256

      8cd22dab819e345e17da77ecd66073f7a5ca572254f2b61af89c6b4a24d855d1

    • SHA512

      4f99cec24e368800da59adc26709352e81e272aaf9717281eab9021e98da1e96d98f332079309a0e701dc3af9b528c3411f6904c42762b85ec11f15e9a3bb12d

    • SSDEEP

      12288:Iq8RG2iNEanaRdAnSZvoZl7VqBS1rKy/02LYHfb/AfDsm82yAuxpvyrfD:IqqG1uKnSmZl7VZ1rF0db/AfDs2fuxpI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks