General

  • Target

    Payment Confirmation.tgz

  • Size

    1.5MB

  • Sample

    240416-h6ajxscb65

  • MD5

    bd7332626030a509435cc9f1228a9bdd

  • SHA1

    891252448886ee7feb9d03bd5ddf5d07716bf9fc

  • SHA256

    cfe615cdbd854f6349c06fa2940a03bc0b03cb89261aa03fdb744ae2718a1579

  • SHA512

    71179d4a5f510c8386789c45b6662901b0a741fbefcf75595fb5b22590df97d9764051a5c89e15ccb762b8ddfc7a2b795c0b28862ce7bd20bfb8ff5826cfdffb

  • SSDEEP

    24576:E3Bk7dkilwiEW9+1Jk2MRrEOYe4dwJcADwokBHX:E3Bk7dMiE8+k2sCU1wokB3

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6834342758:AAHnpbyPCzi-sEo22oVL6DdX9cuTElu_WyA/

Targets

    • Target

      Payment Confirmation.exe

    • Size

      810.6MB

    • MD5

      aa378e18ce2c31bdda7b895fa2c1f5eb

    • SHA1

      32b283eeaf191234998cce48093b38733c4c3a49

    • SHA256

      c4174fb892b92cae024f1dcbd35d779c056e5533c4b883e1388f0616a07d9439

    • SHA512

      cdc6d5c29955d9517fc1c81c166c6f5f01d189f0f69643a36dd9b985974ade2dfeaa000f04c17167472b6aeccdc386fadac678ab0003d77d89022c8d6ae9da2d

    • SSDEEP

      24576:kAs1kFlsitMisWb811kyajrKOYo4HkJ+yxwWZw:9qkFl8isA80yC0mFwW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks