General

  • Target

    CamScan_20231212.exe

  • Size

    334KB

  • Sample

    231212-mvcmcsdbb8

  • MD5

    2fd135ea0c3a82e9e4429f740563f977

  • SHA1

    1617b00ee26f17e8484917d6379cfa50580b90e1

  • SHA256

    86a618fcaba9df35ca00ddea1978760b2f92e5b4a9c2ab749d79464e4c03dc2b

  • SHA512

    a885747cd74100fe55646eb2052e9d2f4bf32c5a92b75ee4843a21b6b3ae072e4a516df3ba719ca9eec5782ee57a574d0b0ba3dd51075d7e321216f2b66dea92

  • SSDEEP

    6144:2uskkWEoPObzIdbgnCpNXF4ZRmyYH/b8NNIk/1Pvxo4zI4gqV7BtXlee2TeU:2ua/bibzL/Zk/5Jo4zTJRD2q

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6669461375:AAGwrSGDuGS4lzGe3ziI4ubZc9TzQ8r1m8o/

Targets

    • Target

      CamScan_20231212.exe

    • Size

      334KB

    • MD5

      2fd135ea0c3a82e9e4429f740563f977

    • SHA1

      1617b00ee26f17e8484917d6379cfa50580b90e1

    • SHA256

      86a618fcaba9df35ca00ddea1978760b2f92e5b4a9c2ab749d79464e4c03dc2b

    • SHA512

      a885747cd74100fe55646eb2052e9d2f4bf32c5a92b75ee4843a21b6b3ae072e4a516df3ba719ca9eec5782ee57a574d0b0ba3dd51075d7e321216f2b66dea92

    • SSDEEP

      6144:2uskkWEoPObzIdbgnCpNXF4ZRmyYH/b8NNIk/1Pvxo4zI4gqV7BtXlee2TeU:2ua/bibzL/Zk/5Jo4zTJRD2q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks