General

  • Target

    7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23

  • Size

    597KB

  • Sample

    231120-nsnghsgf4y

  • MD5

    66dcf542108063008a9795469775c906

  • SHA1

    ecb486b2fd6cff5f9d4888de73bd962878e343a2

  • SHA256

    7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23

  • SHA512

    14058500816a16511008b92c55a8be1d4984035840dbde50dce1a7a1a6a5c9166f7371296a7cf227183ae7795a756ab7893e75d604ecccdb62af280006b1b5ef

  • SSDEEP

    12288:qEX0COPSTivCenShfRTMBuYBqyJ00TD/F4PAuIOpne3tWkq42XjbNnrfz:ySTiqewTmu1y3D/F4ikOokxEbNnrf

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23

    • Size

      597KB

    • MD5

      66dcf542108063008a9795469775c906

    • SHA1

      ecb486b2fd6cff5f9d4888de73bd962878e343a2

    • SHA256

      7d0def77a0bec3d3c3b7aab43cece6a43f4eeccb8295e0bb1f1cea1cc8863a23

    • SHA512

      14058500816a16511008b92c55a8be1d4984035840dbde50dce1a7a1a6a5c9166f7371296a7cf227183ae7795a756ab7893e75d604ecccdb62af280006b1b5ef

    • SSDEEP

      12288:qEX0COPSTivCenShfRTMBuYBqyJ00TD/F4PAuIOpne3tWkq42XjbNnrfz:ySTiqewTmu1y3D/F4ikOokxEbNnrf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks