General

  • Target

    446bf403bee494bb174ee63f34ac2a839587450d508b3205ae6b65ac4db80375

  • Size

    805KB

  • Sample

    231206-dsw4jsaf65

  • MD5

    08ee0d72de9475ba957cd2688b5ac25f

  • SHA1

    45ee3e5fb6b05118508a15e9c6ff60b1a5e68664

  • SHA256

    446bf403bee494bb174ee63f34ac2a839587450d508b3205ae6b65ac4db80375

  • SHA512

    dd67c8f01259a4562c03b849eac5a51b978f8c8252ffcc32d27c475d54cabc47fcaea8e75da8e35e5421f45ec7526944b7c8758f8e8542dee0f200646daca7a6

  • SSDEEP

    24576:QtKtD/61IAwGmGuq7c8+Dj09HnY+fgPH:f6KAd3F7t+09HYK

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      446bf403bee494bb174ee63f34ac2a839587450d508b3205ae6b65ac4db80375

    • Size

      805KB

    • MD5

      08ee0d72de9475ba957cd2688b5ac25f

    • SHA1

      45ee3e5fb6b05118508a15e9c6ff60b1a5e68664

    • SHA256

      446bf403bee494bb174ee63f34ac2a839587450d508b3205ae6b65ac4db80375

    • SHA512

      dd67c8f01259a4562c03b849eac5a51b978f8c8252ffcc32d27c475d54cabc47fcaea8e75da8e35e5421f45ec7526944b7c8758f8e8542dee0f200646daca7a6

    • SSDEEP

      24576:QtKtD/61IAwGmGuq7c8+Dj09HnY+fgPH:f6KAd3F7t+09HYK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks