General

  • Target

    rContract.exe

  • Size

    830KB

  • Sample

    231120-r5p3nagf25

  • MD5

    4ae123b8dd8f2108225f3731453117cd

  • SHA1

    1fcc29ee7df95e89489baf06e86ec0cc39ee2b4f

  • SHA256

    2d2ec5676bd28d3f00ee24b10116feb9540e6bd015b86c8579a716a1237096c8

  • SHA512

    7432110fbb78c32bc429dc944ad864b6451227acd492d61e85145fa1ba117c3a020a0aa83ed3679bea705bddab76c1e0b42467c392f492cc3981bdafdfe84b1c

  • SSDEEP

    24576:kDEJtusmZ5rrQOG5NVcpIeY4wrPxeb/sw3EF99r:wCDmZS5rn4gPx632r

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6820629737:AAGJ8tOkoD9jFHkd_L1kG1ntQ1J6zLhFsMc/

Targets

    • Target

      rContract.exe

    • Size

      830KB

    • MD5

      4ae123b8dd8f2108225f3731453117cd

    • SHA1

      1fcc29ee7df95e89489baf06e86ec0cc39ee2b4f

    • SHA256

      2d2ec5676bd28d3f00ee24b10116feb9540e6bd015b86c8579a716a1237096c8

    • SHA512

      7432110fbb78c32bc429dc944ad864b6451227acd492d61e85145fa1ba117c3a020a0aa83ed3679bea705bddab76c1e0b42467c392f492cc3981bdafdfe84b1c

    • SSDEEP

      24576:kDEJtusmZ5rrQOG5NVcpIeY4wrPxeb/sw3EF99r:wCDmZS5rn4gPx632r

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks