General

  • Target

    NEAS.21218005d2b9dab517e80b87bf4b135e876a18f0d48cd77b29ca89332c615b92.exe

  • Size

    1020KB

  • Sample

    231111-l4jatsdb51

  • MD5

    bdaa8f6c2540a326ff2d992b501ced93

  • SHA1

    3f04b45a176f16ca20fe22ce3ebd8d9efffdef9d

  • SHA256

    21218005d2b9dab517e80b87bf4b135e876a18f0d48cd77b29ca89332c615b92

  • SHA512

    70a1e1913d4341aabd48bf635ddb2ceae24edd7c9cf7a5b258cb59d95df0eaf29984e0b93a954110f02eb943f720b01077bd926791712d084ee10dd86e8fa82d

  • SSDEEP

    24576:j5eiQEkh8BbnG29yem06TgFMDs0XxcHFCT:jRKCG2bmvT8Mhhqk

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      NEAS.21218005d2b9dab517e80b87bf4b135e876a18f0d48cd77b29ca89332c615b92.exe

    • Size

      1020KB

    • MD5

      bdaa8f6c2540a326ff2d992b501ced93

    • SHA1

      3f04b45a176f16ca20fe22ce3ebd8d9efffdef9d

    • SHA256

      21218005d2b9dab517e80b87bf4b135e876a18f0d48cd77b29ca89332c615b92

    • SHA512

      70a1e1913d4341aabd48bf635ddb2ceae24edd7c9cf7a5b258cb59d95df0eaf29984e0b93a954110f02eb943f720b01077bd926791712d084ee10dd86e8fa82d

    • SSDEEP

      24576:j5eiQEkh8BbnG29yem06TgFMDs0XxcHFCT:jRKCG2bmvT8Mhhqk

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks