General

  • Target

    e17138f707986af58fed56d6fc9d03fb

  • Size

    1.3MB

  • Sample

    240327-mg4tpadb8x

  • MD5

    e17138f707986af58fed56d6fc9d03fb

  • SHA1

    b7120b1129056920e96b9328714da9070adcea6e

  • SHA256

    944761699dface72d19767de6114d9a8fd4d8d8c3810405d658281d9cca03957

  • SHA512

    da12bd0cf9d9b72fb803333934fefb7c76ed8cf3d4dd2d77bfefd1c25430b7c307a8016f712d268c5c0f4f7486edfbcf7cb1f71f3cea575ba1a325c6161855f7

  • SSDEEP

    24576:BI8476DOOfx8Dgyfx8DgKTRRnpPRK+XgnoRT2v6k/rOcKyFzUNwDZx2L:J476H58Dgy58DgoRBNRKHoRTq6wKrCZU

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      e17138f707986af58fed56d6fc9d03fb

    • Size

      1.3MB

    • MD5

      e17138f707986af58fed56d6fc9d03fb

    • SHA1

      b7120b1129056920e96b9328714da9070adcea6e

    • SHA256

      944761699dface72d19767de6114d9a8fd4d8d8c3810405d658281d9cca03957

    • SHA512

      da12bd0cf9d9b72fb803333934fefb7c76ed8cf3d4dd2d77bfefd1c25430b7c307a8016f712d268c5c0f4f7486edfbcf7cb1f71f3cea575ba1a325c6161855f7

    • SSDEEP

      24576:BI8476DOOfx8Dgyfx8DgKTRRnpPRK+XgnoRT2v6k/rOcKyFzUNwDZx2L:J476H58Dgy58DgoRBNRKHoRTq6wKrCZU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks