General

  • Target

    9f8fae4914e69773680cdc8f9c9131bdffade575a5ea424f09390468aca6fa24

  • Size

    780KB

  • Sample

    231107-ktcvmadf8y

  • MD5

    43934d382cc80d75a4b348ab6404ac28

  • SHA1

    61d7a7e48eece11a95f6a01f310cad9804eb7cc6

  • SHA256

    9f8fae4914e69773680cdc8f9c9131bdffade575a5ea424f09390468aca6fa24

  • SHA512

    b693a5027ca8d9de40157a9e9754bc66c69b9826d396e5efdb90a83f4fe5ff1222754a7eb0deec8f7c5130fdce1581208e6b55cd42b55d8fa84b287c359ede69

  • SSDEEP

    24576:5bwK8oV8X/RpB6blq6gvvfzkObAJM8q1yt:5h8Sw/HB6JzgnfzbcJM7Yt

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA_SEVEN HILLS CARGO.bat

    • Size

      1010KB

    • MD5

      598a471dddb453d80036375fc9b8893e

    • SHA1

      7682286b446689b8f9f2d0b2c03554b13f03d396

    • SHA256

      348317a6cdde242d659ca060832df6ef808d24bb96d78d5ca3f58c50b7b6cce2

    • SHA512

      e7e1ac713dbdb6a06c0f6586c5700088ecbbdffa69befd221418830c8fd9218116c81b95181ec1b5c917f32abb10ce6bb6cb42c4936dca3e6d41422de4395e9a

    • SSDEEP

      24576:ot6fGhEePZQVxHJ3/DYfqBwX0nuKRY5AI9PpAVH8xP:KhtZQvltwXl95rprZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks