General

  • Target

    3de379139a1c147a730638552851518562431ee09254ac2c50961fb1a8ee70b8

  • Size

    697KB

  • Sample

    231203-cv1zvaha58

  • MD5

    d7e980df2f5d33b2034053d5b61dd93d

  • SHA1

    2c4a4e7024a01d6647eb7714c6a70ba8bc327914

  • SHA256

    3de379139a1c147a730638552851518562431ee09254ac2c50961fb1a8ee70b8

  • SHA512

    29b4c6b3d38ae48fac2e98d4ad5daad42b242253b250136795b5c8aa4f74b27e42587173eabe4ed55457edf62ccf390f41f8bb7d45f5c3bce7bc14f6700713b4

  • SSDEEP

    12288:Sbw1E6jD/89U2w2xzzmkl8cCKV0jOmZ8iuXcs+PIopox/f:aw1tD/QUp2xvmHcCw0j9KcpQe

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3de379139a1c147a730638552851518562431ee09254ac2c50961fb1a8ee70b8

    • Size

      697KB

    • MD5

      d7e980df2f5d33b2034053d5b61dd93d

    • SHA1

      2c4a4e7024a01d6647eb7714c6a70ba8bc327914

    • SHA256

      3de379139a1c147a730638552851518562431ee09254ac2c50961fb1a8ee70b8

    • SHA512

      29b4c6b3d38ae48fac2e98d4ad5daad42b242253b250136795b5c8aa4f74b27e42587173eabe4ed55457edf62ccf390f41f8bb7d45f5c3bce7bc14f6700713b4

    • SSDEEP

      12288:Sbw1E6jD/89U2w2xzzmkl8cCKV0jOmZ8iuXcs+PIopox/f:aw1tD/QUp2xvmHcCw0j9KcpQe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks