General

  • Target

    404e6aba818bcec2cfebe11f2fa9d557

  • Size

    804KB

  • Sample

    240104-jp24aaeaf5

  • MD5

    404e6aba818bcec2cfebe11f2fa9d557

  • SHA1

    17e86a5790521fe516e8f4a5299eb3d931eea327

  • SHA256

    71cb90765301ebbaa989b1ee8c1433def78ffda344f19be64a3a57afe296d293

  • SHA512

    d72c474c838be696e11b27ea478676faa98cb08c8bd3aa2235f3bd23c7d814991c5aa06b0c215036c9852fb24ec21dc7b07c9423ceead51d4510a8fdf33fa73f

  • SSDEEP

    12288:++IWjT4AnZloR65AXwgFvuSSBIL4hmrK48ft4t88q7z+q+ApldAX5yFVu/BEVl0R:++5oR6qgYaft4ef+T10U5EP0bV

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1883321234:AAG_9SFLBWQtrLAcZi4KtuAJ1wTnnOyL5Fg/sendDocument

Targets

    • Target

      404e6aba818bcec2cfebe11f2fa9d557

    • Size

      804KB

    • MD5

      404e6aba818bcec2cfebe11f2fa9d557

    • SHA1

      17e86a5790521fe516e8f4a5299eb3d931eea327

    • SHA256

      71cb90765301ebbaa989b1ee8c1433def78ffda344f19be64a3a57afe296d293

    • SHA512

      d72c474c838be696e11b27ea478676faa98cb08c8bd3aa2235f3bd23c7d814991c5aa06b0c215036c9852fb24ec21dc7b07c9423ceead51d4510a8fdf33fa73f

    • SSDEEP

      12288:++IWjT4AnZloR65AXwgFvuSSBIL4hmrK48ft4t88q7z+q+ApldAX5yFVu/BEVl0R:++5oR6qgYaft4ef+T10U5EP0bV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks