General

  • Target

    f33e935d77eff075685110f73236cd817b4b195fdc6385c24ea6ecf75939d6f1

  • Size

    262KB

  • Sample

    240428-bfz9bsce35

  • MD5

    28e7bd2eb2adeabe10fe294f8e873879

  • SHA1

    5665aa18335d05a0427ce4774602e39d18e1d31f

  • SHA256

    f33e935d77eff075685110f73236cd817b4b195fdc6385c24ea6ecf75939d6f1

  • SHA512

    48a30d8ef0d084a5150032d9bc9c000a729b1f628e7f789fb0b70e23e890e4b10d320d0d11d55840628c37c95769e54177d5369d16e46741dc1b9f38dd9d618a

  • SSDEEP

    3072:YqqaM97eOTPiK3DruiiF/XbKjPo18lw209plIVgnoj94mOzT8HzNB210sdGqehoe:jCteODDmzKtH0RNfz0+BUJOgwyxtG6

Malware Config

Targets

    • Target

      f33e935d77eff075685110f73236cd817b4b195fdc6385c24ea6ecf75939d6f1

    • Size

      262KB

    • MD5

      28e7bd2eb2adeabe10fe294f8e873879

    • SHA1

      5665aa18335d05a0427ce4774602e39d18e1d31f

    • SHA256

      f33e935d77eff075685110f73236cd817b4b195fdc6385c24ea6ecf75939d6f1

    • SHA512

      48a30d8ef0d084a5150032d9bc9c000a729b1f628e7f789fb0b70e23e890e4b10d320d0d11d55840628c37c95769e54177d5369d16e46741dc1b9f38dd9d618a

    • SSDEEP

      3072:YqqaM97eOTPiK3DruiiF/XbKjPo18lw209plIVgnoj94mOzT8HzNB210sdGqehoe:jCteODDmzKtH0RNfz0+BUJOgwyxtG6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks