General

  • Target

    171c3cebf6a3f2532e73c3f2e20cac4a.exe

  • Size

    666KB

  • Sample

    240102-s43g2aghcq

  • MD5

    171c3cebf6a3f2532e73c3f2e20cac4a

  • SHA1

    9e8bcb302d846b16f6721a2198c270d1efa69b85

  • SHA256

    5dc41425af32e771e1146c073aeed6b5a5ed326b621970f94c78cc8b80872de0

  • SHA512

    7220981399dcccc94b55788f45ec41b44b350a9cad1046d1cbfc0ac5eda4f24295b5dedc890ef6c95c7671296e9e42d80be073a9d48bb50ac1209657e3a2ee16

  • SSDEEP

    12288:jvjM502iNv4s8fE7qdw87eo3bm2pMlCPxVlIH0JyP5:TU01usjqdw87xbdx4UY

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      171c3cebf6a3f2532e73c3f2e20cac4a.exe

    • Size

      666KB

    • MD5

      171c3cebf6a3f2532e73c3f2e20cac4a

    • SHA1

      9e8bcb302d846b16f6721a2198c270d1efa69b85

    • SHA256

      5dc41425af32e771e1146c073aeed6b5a5ed326b621970f94c78cc8b80872de0

    • SHA512

      7220981399dcccc94b55788f45ec41b44b350a9cad1046d1cbfc0ac5eda4f24295b5dedc890ef6c95c7671296e9e42d80be073a9d48bb50ac1209657e3a2ee16

    • SSDEEP

      12288:jvjM502iNv4s8fE7qdw87eo3bm2pMlCPxVlIH0JyP5:TU01usjqdw87xbdx4UY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks