General

  • Target

    ee4a21bd2b6eac8f5e84f63fd40e2f176e13a274b89d11e44f09129ab48faf9d

  • Size

    353KB

  • Sample

    240425-bya26ada61

  • MD5

    b701ea35efaac905d15153b477c99080

  • SHA1

    193575f64d8d9c6ef95d60f1a3b52f25187527b8

  • SHA256

    ee4a21bd2b6eac8f5e84f63fd40e2f176e13a274b89d11e44f09129ab48faf9d

  • SHA512

    c5aa2707e58d2f94e8dc977a66722df338bd86b7237196fc12fa996f18a85ec400033efcdb298618144fcc7d32d9a03390abd7f7835e283b9619b25a269fd50c

  • SSDEEP

    6144:snKVZU8aYzA7dXIz3LgvZd1kYCIOYHTQwrC/DeyeUlTyWg/Bds3v:SKVyyAez3L6Z7XNOuTuLeytXCs3

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7185592808:AAH40VecOIxIokAMjd2dL-3MoQxpbXJyxfE/

Targets

    • Target

      ee4a21bd2b6eac8f5e84f63fd40e2f176e13a274b89d11e44f09129ab48faf9d

    • Size

      353KB

    • MD5

      b701ea35efaac905d15153b477c99080

    • SHA1

      193575f64d8d9c6ef95d60f1a3b52f25187527b8

    • SHA256

      ee4a21bd2b6eac8f5e84f63fd40e2f176e13a274b89d11e44f09129ab48faf9d

    • SHA512

      c5aa2707e58d2f94e8dc977a66722df338bd86b7237196fc12fa996f18a85ec400033efcdb298618144fcc7d32d9a03390abd7f7835e283b9619b25a269fd50c

    • SSDEEP

      6144:snKVZU8aYzA7dXIz3LgvZd1kYCIOYHTQwrC/DeyeUlTyWg/Bds3v:SKVyyAez3L6Z7XNOuTuLeytXCs3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks