General

  • Target

    132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea_JC.exe

  • Size

    980KB

  • Sample

    231012-pj49cahh8w

  • MD5

    41fb928ba68387772e403c843854bcce

  • SHA1

    d076e78785373e33b5476bdcc1a71beb10c7cbdd

  • SHA256

    132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea

  • SHA512

    43d05ec1488b3e6b37c782130b9612c9d5db7947e31acc8293badad38938030eb672ca2dc504432946f9d661a099fb02253dc6db7e1176754f22ffc6694eeed4

  • SSDEEP

    12288:+AfDuHOXwd0wwSWbj3eIiL9mjcJURhdh8lUCCGWFWV42+juCpzU1tpRJKltk/Z:+gWSwBWbjuvmzRhMcNaD9x

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1150868317029023815/cT6u46fA3REOAlZKgnGhenvlyBkS2aXAuSOeMy71MU-CPTLC2dPDTvQxc4lMobWH2PYW

Targets

    • Target

      132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea_JC.exe

    • Size

      980KB

    • MD5

      41fb928ba68387772e403c843854bcce

    • SHA1

      d076e78785373e33b5476bdcc1a71beb10c7cbdd

    • SHA256

      132c3c334f0c7c02b5cd1aeb6c89ae8b7355c07d4c1683f3287168188cd958ea

    • SHA512

      43d05ec1488b3e6b37c782130b9612c9d5db7947e31acc8293badad38938030eb672ca2dc504432946f9d661a099fb02253dc6db7e1176754f22ffc6694eeed4

    • SSDEEP

      12288:+AfDuHOXwd0wwSWbj3eIiL9mjcJURhdh8lUCCGWFWV42+juCpzU1tpRJKltk/Z:+gWSwBWbjuvmzRhMcNaD9x

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks