Resubmissions

07/11/2023, 07:03

231107-hvnx6sch8s 10

07/11/2023, 06:56

231107-hqcdksed66 10

General

  • Target

    ef9997dc0f82da72b3224fb1e3859ec6.exe

  • Size

    757KB

  • Sample

    231107-hqcdksed66

  • MD5

    ef9997dc0f82da72b3224fb1e3859ec6

  • SHA1

    d52a6edaa52164d8e8b5d712fbf46729a9d57613

  • SHA256

    d1164fe7652f2c5c800f0227383ebbd77157e84ff84d6713e4a8ea3ff7d47f86

  • SHA512

    a0ba0026f20123ae8af803beab9da5fa46a886d3f07e6f74796c1587385993f509555ae451964494a035995528b7407e5c540ac03394e3499ac7a9b1dc2bf967

  • SSDEEP

    12288:2pW5DIaIftlexM1+meMfmBr9J4Hlim12e3d1l99NHfQXDnzr1LVI5fd2BT:2k50a0T1+JMMxJ4HlHc+1l9zHfMVIDOT

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      ef9997dc0f82da72b3224fb1e3859ec6.exe

    • Size

      757KB

    • MD5

      ef9997dc0f82da72b3224fb1e3859ec6

    • SHA1

      d52a6edaa52164d8e8b5d712fbf46729a9d57613

    • SHA256

      d1164fe7652f2c5c800f0227383ebbd77157e84ff84d6713e4a8ea3ff7d47f86

    • SHA512

      a0ba0026f20123ae8af803beab9da5fa46a886d3f07e6f74796c1587385993f509555ae451964494a035995528b7407e5c540ac03394e3499ac7a9b1dc2bf967

    • SSDEEP

      12288:2pW5DIaIftlexM1+meMfmBr9J4Hlim12e3d1l99NHfQXDnzr1LVI5fd2BT:2k50a0T1+JMMxJ4HlHc+1l9zHfMVIDOT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks