Resubmissions

11/03/2024, 15:28

240311-swfcjaac54 10

11/03/2024, 07:19

240311-h5yv5aeg26 10

General

  • Target

    loggggg.exe

  • Size

    351KB

  • Sample

    240311-swfcjaac54

  • MD5

    278015a19d8c36ae65b7b4a75844268e

  • SHA1

    14785c7c6a476a915fc56ae2aeb980854cec5308

  • SHA256

    6ec934b7870cac065a7f9e3e92631e97293c4b5754a36902f133c45101cc5514

  • SHA512

    3eb19807af1ae1f74eb27d92f225b5efa37dd6919502313af95870c8c0b8b966b488027e1c73617ed87748d9a82b05cf1c5a00f3d7257f3cc98e177e226bb42a

  • SSDEEP

    6144:TArRy+iwN+1prBnJ+dz2ifHhRoKiGgtwWXs9qI5MR9x9YimoG7Ohf:TArRyUqBQ12ChRo2WR9dG7k

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6701575727:AAH5fUj-JYRvr8ZYms1aw4-XvuerP8njXdI/

Targets

    • Target

      loggggg.exe

    • Size

      351KB

    • MD5

      278015a19d8c36ae65b7b4a75844268e

    • SHA1

      14785c7c6a476a915fc56ae2aeb980854cec5308

    • SHA256

      6ec934b7870cac065a7f9e3e92631e97293c4b5754a36902f133c45101cc5514

    • SHA512

      3eb19807af1ae1f74eb27d92f225b5efa37dd6919502313af95870c8c0b8b966b488027e1c73617ed87748d9a82b05cf1c5a00f3d7257f3cc98e177e226bb42a

    • SSDEEP

      6144:TArRy+iwN+1prBnJ+dz2ifHhRoKiGgtwWXs9qI5MR9x9YimoG7Ohf:TArRyUqBQ12ChRo2WR9dG7k

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks