General

  • Target

    ca2e7abccc5cb10dce5c6e7374fe5a35.bin

  • Size

    625KB

  • Sample

    240327-evkc7sfe7z

  • MD5

    792922fccd5d5dd5111e311c6dfaa329

  • SHA1

    a0f5b30d53f118732676fa239fc45a7ca336bb8c

  • SHA256

    c97a9008aad295bd5fb4e207d392b401c2d074b51aedafc7b6211ffa517654e8

  • SHA512

    e469518a3d0a9b2cbe5e08c74b599a574b6fdcf080621f4f47525ab9c8644fb2a7030e714147b3b0c04f3a3ca5ebd1b0c0be022a6623453b9172e487fb8c447f

  • SSDEEP

    12288:Zgo5YP2+swpqTvhVZP4lLrN4jVH7VNakTvi73m4YX7O4DEeq52vTvR5QFo:NYP2woTJVZCLB4jVbTakKqX7tEeRvTcC

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6240128422:AAGfewUxVcQqKio_MV181yAuk31JpsBcgy8/

Targets

    • Target

      ee1f5806bdc523e06b98c513142a735ac3c16da9948c645a9916bd68cf24673b.exe

    • Size

      681KB

    • MD5

      ca2e7abccc5cb10dce5c6e7374fe5a35

    • SHA1

      4c4ff642534ebb32d4edd6c752f6309ee9fbcf02

    • SHA256

      ee1f5806bdc523e06b98c513142a735ac3c16da9948c645a9916bd68cf24673b

    • SHA512

      badc6a66922e810322e6e7f4876de5bf2d7e67322c7ecc03847aca201f4c79b4017abbfaf30145adaa201c348579c36880de6c21a30d6911257799dff2c89526

    • SSDEEP

      12288:BJggC74CMw3iOdiDSZnRtnt9iXSSfI5qIFngvpZsG9WxzQaU3y:BJgFoOdjtnOSKPhh6GEQn3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Tasks