General

  • Target

    0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4

  • Size

    166KB

  • Sample

    240423-tsxm3shg95

  • MD5

    31bb40e9ad8dd4797b71b4ece1891b82

  • SHA1

    feb097b406032ac60fd90ece24f0147ffbf0f088

  • SHA256

    0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4

  • SHA512

    16dec38ae3505e8183e5f3e51245b79c269e7f8fb769108f4ac21543d08df7036ebd3345af4712a06453f9b72595744b51a71f3132b9849b83f5bbb8f71113a4

  • SSDEEP

    3072:tD/TzjlPUxRJgjHvW032MD944l1KxhGBdeieE1+kZ7DQMy2GgK0OgMaSyu6BkQ:tD/TzjlqgjHvW032MD9481QhGq1i02G1

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5676971476:AAFdGsXW8kwzXNIluAGV-a4sJ2XBy68O9WI/

Targets

    • Target

      0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4

    • Size

      166KB

    • MD5

      31bb40e9ad8dd4797b71b4ece1891b82

    • SHA1

      feb097b406032ac60fd90ece24f0147ffbf0f088

    • SHA256

      0a1bb6980b88452e1353436fa29a5ad1fbfe51d1ea14d1e98f45af38d27f59a4

    • SHA512

      16dec38ae3505e8183e5f3e51245b79c269e7f8fb769108f4ac21543d08df7036ebd3345af4712a06453f9b72595744b51a71f3132b9849b83f5bbb8f71113a4

    • SSDEEP

      3072:tD/TzjlPUxRJgjHvW032MD944l1KxhGBdeieE1+kZ7DQMy2GgK0OgMaSyu6BkQ:tD/TzjlqgjHvW032MD9481QhGq1i02G1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks