General

  • Target

    100db370d21c6125afd6d3358d100860.bin

  • Size

    312KB

  • Sample

    240502-bdb4qacc7w

  • MD5

    992c2839fd14e0648317aab613b52983

  • SHA1

    9bb8497bf6731c4762584e708bd7d12a089d28a5

  • SHA256

    f2e86040af8be9ce037f5692c994f54dd9b773c55b44477c2face02d095add3a

  • SHA512

    338d57d1c4579b808e9b2f502c1e41d83620046e8b6ddf9d57262b8bb5cb5793f594f3e5a9848c4a4bd600e31b4c1d318e4d92e4d13f367516a6c8ea9d6eb841

  • SSDEEP

    6144:qUk1wTXLCqVM6HmA0YRkU0xqjkh4Jz7OfeiNd7kIHR+ovWftwmt:5dXuqFfkzx1Kl7Ofxj7clvt

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7185592808:AAH40VecOIxIokAMjd2dL-3MoQxpbXJyxfE/

Targets

    • Target

      60cec2b7e0df1c0b13e6b636ae979b2e6abb5e567a62326bf36c73c84a348636.exe

    • Size

      573KB

    • MD5

      100db370d21c6125afd6d3358d100860

    • SHA1

      cb7a55063bcad757c98db289720b79cc127e8c55

    • SHA256

      60cec2b7e0df1c0b13e6b636ae979b2e6abb5e567a62326bf36c73c84a348636

    • SHA512

      a9ea18c130358aae6d5516f765a09c1325a25237ab27aff1656b2e774aa81506e0d397190b3a9456c77e638da630ddd0618e6f56c68531ccbe9b3b3dd1213669

    • SSDEEP

      12288:lfKDRvpATCjwb5PpJYuFAVM8YyoCP7r9r/+ppppppppppppppppppppppppppppd:EbATvRpJT8YZC1q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks