General

  • Target

    de232aa933a1aa9fdf4a83c125cdac45b021d07fe756378577e55f15ace14540

  • Size

    698KB

  • Sample

    231206-vvnzdsba22

  • MD5

    721daf64e38ed600b0293f82418df005

  • SHA1

    c6227efb43f48fec89f2340071ab7bddb281e9ba

  • SHA256

    de232aa933a1aa9fdf4a83c125cdac45b021d07fe756378577e55f15ace14540

  • SHA512

    a1dd08d38e0b0f24caad00c4bd9cd324e5f2c86cf4bf5a5ad2b483236fbb02befb259bcf25299adbddbb2a382d88490fd8bee71deea59d723c11a229af840f0e

  • SSDEEP

    12288:Mu5QjjQIu8DW5ECIVsP3Zqn3MkfwNEtQTYezmVeZwWA2cJAMVyTaLQ:3IN+DIOPJqnLtg6bEoLk

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1181175876428234762/vyp2c0TtvZWnT44gDou-o5BXqrA0VFVwF_fjcBmcOk48_6kYSNpVxKQy260BXHtoN7cX

Targets

    • Target

      qoutation.exe

    • Size

      741KB

    • MD5

      0d950c4060fa70d245c19188008b3979

    • SHA1

      fa617cc13128242c7098bcc9a03fe6111fdf6486

    • SHA256

      302424b06f54db9c6f269d34c4db7e6a004a09e228e62a6f646ed02d4c05eab4

    • SHA512

      3bd2cdc10fca28937d24e07d070664c317b19218f5a68ed3fd663f3ea7aaeb84a92ee915fabd78523c95a4d966069dd2b8765524e859d9647badf84361369e36

    • SSDEEP

      12288:9qc3+GCueH5qJmwvUenxMCmJ3AIfS3EtQba6zmJcZ11vz8pyL2xo2bHXk7USye8B:9/uG2qJNvUexFortA6is2US9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks