General

  • Target

    2cd8bNI2Q8OjPmz.rar

  • Size

    630KB

  • Sample

    231012-qqj3esbg31

  • MD5

    3c91ba35ae61223001a2d341fcafec9a

  • SHA1

    11af34cf012d4bea7aafb749da43c0efdb982f28

  • SHA256

    ee9d2238e5ad0af5b8ec9d18d1d8f08811adb00adac338082e68dcaa34689300

  • SHA512

    66a0d983ee25a3d0b74341a7090b42da46bfdfcacb78337d843b29526cfab92e4a01d048c134d2cb9617ead6f1fcb7832472db1b33b60cb12cde2aac9982b50c

  • SSDEEP

    12288:nCGJm5DtbloAiStVgdcXGigpAp9xKU3o7OtI0MYMzulNuQwJw/c6qujhEFh8GwDB:n9c7bloAiSIdHrpa2h6q0MCwJwER+uFs

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1149008875278827590/cDePfZzx0LuY-zsiPElF0EyHtUrwRcqr7nFc5Cn0Z6UPWroO_adKQZCisnYtu09CBl3e

Targets

    • Target

      2cd8bNI2Q8OjPmz.exe

    • Size

      981KB

    • MD5

      3de07ffe868ada1a96711d2b4220e5c8

    • SHA1

      743995cb278684b37e915910149078e87c57359e

    • SHA256

      346bcb7c4e51ec2d4555b72eac33096db6e58f3290d3c0c9e26b6e516912fafa

    • SHA512

      902aaf0e52baaf6fda66e167acf03ee8bfe54d1479cede44c898142f35b271ea24b915908a87ee5e44cee16117ebaa9ab1b591fc5e508afb296842747c605a7f

    • SSDEEP

      24576:Og9btzessOwlK4MbRzq3Y/ZUqMuO7tpXATRY4BY:Ogi5JMhq3Y/ZUr/XWY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks