General

  • Target

    1d15b950585afb67e29aaccd786e73cc

  • Size

    1.3MB

  • Sample

    231230-1dgfwaegg3

  • MD5

    1d15b950585afb67e29aaccd786e73cc

  • SHA1

    407c97da82309cdb81da1cc839f1d9c49ab5169e

  • SHA256

    8078c7e3b89bfcf0eca7583b3a0509bddc7c83b6aeee05a81262946f5c011ca8

  • SHA512

    9b9f3b90782dc36d668177e5beb9fbf528c3d1d391395f7d8135fbe1b8a078fc01aa710d20d7b6a61822b79b9d33b8f9afa72324cca9a9408c52a7cc76f87bd8

  • SSDEEP

    24576:8y2Avjs89eOKTtr7zSOCW3LtXRLPT1zi/3BrmMnfk/iQ2+S0d:8mvjsaeOUtXuOZbB1PTxip9fk/Pj

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1d15b950585afb67e29aaccd786e73cc

    • Size

      1.3MB

    • MD5

      1d15b950585afb67e29aaccd786e73cc

    • SHA1

      407c97da82309cdb81da1cc839f1d9c49ab5169e

    • SHA256

      8078c7e3b89bfcf0eca7583b3a0509bddc7c83b6aeee05a81262946f5c011ca8

    • SHA512

      9b9f3b90782dc36d668177e5beb9fbf528c3d1d391395f7d8135fbe1b8a078fc01aa710d20d7b6a61822b79b9d33b8f9afa72324cca9a9408c52a7cc76f87bd8

    • SSDEEP

      24576:8y2Avjs89eOKTtr7zSOCW3LtXRLPT1zi/3BrmMnfk/iQ2+S0d:8mvjsaeOUtXuOZbB1PTxip9fk/Pj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks