General

  • Target

    z15Payment27_06_2023.exe

  • Size

    644KB

  • Sample

    231011-ng3gasdd85

  • MD5

    321850c5a150f6fa4adab3b1772169f3

  • SHA1

    65311a6c52e86cdc07bbc4897defb46d79f26698

  • SHA256

    e068262e4c1807050558428bab480871a43ceb983ab6c427454ffcb1a205aafa

  • SHA512

    80934ca8ce8e579fd670a583950ac17dcb58c399a877375ae4a815958ecdda6e2c22a06e78504f119ee6e9099534c11c56d5154bfb82e853882269bd43f1ce9a

  • SSDEEP

    12288:A2iNMyiRJU/Wcuf+w/FltbzfJSTROpto1WASZZyE/NrqzZhnDENgTUcxSj0p6:A1FFeNT/FlpqROpkWA+d/NrcZN4sSjO6

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      z15Payment27_06_2023.exe

    • Size

      644KB

    • MD5

      321850c5a150f6fa4adab3b1772169f3

    • SHA1

      65311a6c52e86cdc07bbc4897defb46d79f26698

    • SHA256

      e068262e4c1807050558428bab480871a43ceb983ab6c427454ffcb1a205aafa

    • SHA512

      80934ca8ce8e579fd670a583950ac17dcb58c399a877375ae4a815958ecdda6e2c22a06e78504f119ee6e9099534c11c56d5154bfb82e853882269bd43f1ce9a

    • SSDEEP

      12288:A2iNMyiRJU/Wcuf+w/FltbzfJSTROpto1WASZZyE/NrqzZhnDENgTUcxSj0p6:A1FFeNT/FlpqROpkWA+d/NrcZN4sSjO6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks