General

  • Target

    4da07425b03c2c696b1699f13bfb716368d8252f7076b70b0d7c063808b68640

  • Size

    245KB

  • Sample

    240425-ccfaesdb97

  • MD5

    d521ec4eacb366eb1698fb56951cf53b

  • SHA1

    8f93e3a9eaedb26146a0fd38cf91f404bd7fd7a1

  • SHA256

    4da07425b03c2c696b1699f13bfb716368d8252f7076b70b0d7c063808b68640

  • SHA512

    7dc91cb4ce38dd01e2972016b27f2260b0ab72ffb8dedb7997652b69bbff40e310a44ed2b520357687a8e07acc99c505c19ff6344d87dbc394dd6e628c666436

  • SSDEEP

    3072:Le8frvzv0DXjboTP6tJPIrth5wTv5myg9F1:LVfrvzv0DXvUP6zKhOTlgX

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      4da07425b03c2c696b1699f13bfb716368d8252f7076b70b0d7c063808b68640

    • Size

      245KB

    • MD5

      d521ec4eacb366eb1698fb56951cf53b

    • SHA1

      8f93e3a9eaedb26146a0fd38cf91f404bd7fd7a1

    • SHA256

      4da07425b03c2c696b1699f13bfb716368d8252f7076b70b0d7c063808b68640

    • SHA512

      7dc91cb4ce38dd01e2972016b27f2260b0ab72ffb8dedb7997652b69bbff40e310a44ed2b520357687a8e07acc99c505c19ff6344d87dbc394dd6e628c666436

    • SSDEEP

      3072:Le8frvzv0DXjboTP6tJPIrth5wTv5myg9F1:LVfrvzv0DXvUP6zKhOTlgX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks