General

  • Target

    NEAS.tmpexe.exe

  • Size

    644KB

  • Sample

    231202-l969vabg87

  • MD5

    219492f049fb6d224dc912fb1de2d515

  • SHA1

    ecfbfb5a6714032f4c811601bf8146c1f580b58f

  • SHA256

    6d3e0f4b400eeb388c288d1151c5051224f99497a522424f60d9cdcc63157cab

  • SHA512

    7f7cf112ff91e0634728a42937051326c5810ef1fbf1b3b9e8a6847b9f34f2ebdb765e046ee4b61f6d286e75ada5cfd4db45eb876e2eb61e8ca9309844ee2878

  • SSDEEP

    12288:8K361h61EWGqLia/AsN3xoiFyit3+hBSEvowv409EVjbEQ8q61:8vY7GUiasSnt3qBSE1ejbEQ8v

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      NEAS.tmpexe.exe

    • Size

      644KB

    • MD5

      219492f049fb6d224dc912fb1de2d515

    • SHA1

      ecfbfb5a6714032f4c811601bf8146c1f580b58f

    • SHA256

      6d3e0f4b400eeb388c288d1151c5051224f99497a522424f60d9cdcc63157cab

    • SHA512

      7f7cf112ff91e0634728a42937051326c5810ef1fbf1b3b9e8a6847b9f34f2ebdb765e046ee4b61f6d286e75ada5cfd4db45eb876e2eb61e8ca9309844ee2878

    • SSDEEP

      12288:8K361h61EWGqLia/AsN3xoiFyit3+hBSEvowv409EVjbEQ8q61:8vY7GUiasSnt3qBSE1ejbEQ8v

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks