General

  • Target

    FedEx_AWB#50931274643.exe

  • Size

    611KB

  • Sample

    231011-hr6c2sge3w

  • MD5

    9d7fcfbafb4a2bd4c4c146b9c105f8de

  • SHA1

    81289d6023da1dc7ea2e3749b66242cb19f12275

  • SHA256

    59a8979d512482bc6a656efb0445fbd1ad97b6c07e6b4353204c6992daca3e35

  • SHA512

    3aac7f8537831c7015ef34ae803ddd587631b5ab57c99c607f7dfd1f379c2339fdcb3c516594461977dcda876495299893dc1e5b876cea798cd516d3819ca9cb

  • SSDEEP

    12288:Wl725mONpEBq3sjz9z+325LjOEtH6wHl/W9L6oKnT7S/VPhrW7aSzRN//:jhRcvNt5TtH3HlO0cPdSdN/

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1155632175954280508/UJAHnim5EEI9C_FOdMt75WQIx-LpUygiYRchNShhIadpLPi-9bmzOnR0zzqjFcqt2OV4

Targets

    • Target

      FedEx_AWB#50931274643.exe

    • Size

      611KB

    • MD5

      9d7fcfbafb4a2bd4c4c146b9c105f8de

    • SHA1

      81289d6023da1dc7ea2e3749b66242cb19f12275

    • SHA256

      59a8979d512482bc6a656efb0445fbd1ad97b6c07e6b4353204c6992daca3e35

    • SHA512

      3aac7f8537831c7015ef34ae803ddd587631b5ab57c99c607f7dfd1f379c2339fdcb3c516594461977dcda876495299893dc1e5b876cea798cd516d3819ca9cb

    • SSDEEP

      12288:Wl725mONpEBq3sjz9z+325LjOEtH6wHl/W9L6oKnT7S/VPhrW7aSzRN//:jhRcvNt5TtH3HlO0cPdSdN/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks