General

  • Target

    4dfc3835f58f1cbdf52fbd10362339e5a2f6d7a7e618c70937898e236ff6511a

  • Size

    1.2MB

  • Sample

    231207-da27vaaed2

  • MD5

    c9c254e7483a97ff8f984b71b01e4cc3

  • SHA1

    7db8850c4ef74fc9134f1b0e97a3c9930e5fdadd

  • SHA256

    4dfc3835f58f1cbdf52fbd10362339e5a2f6d7a7e618c70937898e236ff6511a

  • SHA512

    7dc67a0f4491e3d68a1307d8f20cd2aaf37c592f3d90386ee6a8ab94f549c8dc5451a3f0cd1aef2f781800a66da281a9d979475862e814ec438877846b0f95de

  • SSDEEP

    12288:le+QaueH5qUuRDIlaNOjAFXxCyA1582aGDW7/ntf2B6ogV:leiqUMI4NOjICZK/tf2o

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      70031MES.EXE

    • Size

      565KB

    • MD5

      b07419d2bf5fd6f6f75b47fd857c42ea

    • SHA1

      a3df0a87d181a1c0912d4fe9e8848741688d6445

    • SHA256

      3ca50b691c245e5d31ba80c101285ef26fc08c0ae5afcca3ab2b61b53dabec35

    • SHA512

      7d5b779c3181bdfabdaab240e5ca4c0c47bfa3b0ee002f9aa5ec8e649ca7df95e878060985ca0ee18d035e9e1e482b7075f921ef86ed0acfb1871f2961578fb8

    • SSDEEP

      12288:1e+QaueH5qUuRDIlaNOjAFXxCyA1582aGDW7/ntf2B6ogV:1eiqUMI4NOjICZK/tf2o

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks