General

  • Target

    ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac

  • Size

    820KB

  • Sample

    231206-dkxp4sae94

  • MD5

    e1eb6a93f5b33ba65a052a6de047af05

  • SHA1

    46b112ed5b75224f44707967ccebf15e99845be3

  • SHA256

    ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac

  • SHA512

    abdce0bb8ddf97e68e5d93d6e6cd5feb98658f9c2020a2677c83dd6777ba6d49d81b30f243348bdaa2f84da21636cfbfe8c54a069829b67ecfe3fea787a191bd

  • SSDEEP

    12288:OLKE6jD/62iNG5nF8TUEo0g+OVY38KclmzNsvsuG6rxN71wQw4VvFXHUQ853:OLKtD/61I6vSGsp8Nqs81NhE45NS5

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6774056184:AAGNRsfh8TKtp3v_QDZCQW1e8ODSvVaHvMo/

Targets

    • Target

      ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac

    • Size

      820KB

    • MD5

      e1eb6a93f5b33ba65a052a6de047af05

    • SHA1

      46b112ed5b75224f44707967ccebf15e99845be3

    • SHA256

      ef1fbaf09a00979fb3c25debeebe53c2ff844f11d817d5d925c634666c5657ac

    • SHA512

      abdce0bb8ddf97e68e5d93d6e6cd5feb98658f9c2020a2677c83dd6777ba6d49d81b30f243348bdaa2f84da21636cfbfe8c54a069829b67ecfe3fea787a191bd

    • SSDEEP

      12288:OLKE6jD/62iNG5nF8TUEo0g+OVY38KclmzNsvsuG6rxN71wQw4VvFXHUQ853:OLKtD/61I6vSGsp8Nqs81NhE45NS5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks