General

  • Target

    P.O 2023-69415002.bat

  • Size

    1018KB

  • Sample

    231011-yktnnshf9w

  • MD5

    e4e1075b03f102d9d07619194b7e5fbb

  • SHA1

    ef833d4052c3efff9315c8f2845c2d5e20f7165f

  • SHA256

    b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da

  • SHA512

    1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e

  • SSDEEP

    24576:/qfa722mM+vmWw3/MzxW2LhbOTx61lx6ULpzF:ku+HxVbOVyT

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      P.O 2023-69415002.bat

    • Size

      1018KB

    • MD5

      e4e1075b03f102d9d07619194b7e5fbb

    • SHA1

      ef833d4052c3efff9315c8f2845c2d5e20f7165f

    • SHA256

      b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da

    • SHA512

      1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e

    • SSDEEP

      24576:/qfa722mM+vmWw3/MzxW2LhbOTx61lx6ULpzF:ku+HxVbOVyT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks