General

  • Target

    d4b599753a1d614b9dbe4dd3ad33ce4fa237e771fb124163cf4c071d5f34e097

  • Size

    245KB

  • Sample

    240507-cbrbasdc2w

  • MD5

    4ec09745a6485cb06865c5957190a4d9

  • SHA1

    e5ea646ddeb732446c2b1d1b0486c38d794fe24a

  • SHA256

    d4b599753a1d614b9dbe4dd3ad33ce4fa237e771fb124163cf4c071d5f34e097

  • SHA512

    3ab311d3f823a3da3fdff915e0df994b61bf6a7053281420025263ddf2bed867e3d36fcddcd6932ad388ba1e63722b13fda7b5705b30097d6c65eb15b0244445

  • SSDEEP

    3072:v/rfzfrPKqSMs4rBzzps/I1eKX8YMtIBTUm53wETEu3:vjfzfrPKqSMnVzzpleKX8YCI1UoPTF

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      d4b599753a1d614b9dbe4dd3ad33ce4fa237e771fb124163cf4c071d5f34e097

    • Size

      245KB

    • MD5

      4ec09745a6485cb06865c5957190a4d9

    • SHA1

      e5ea646ddeb732446c2b1d1b0486c38d794fe24a

    • SHA256

      d4b599753a1d614b9dbe4dd3ad33ce4fa237e771fb124163cf4c071d5f34e097

    • SHA512

      3ab311d3f823a3da3fdff915e0df994b61bf6a7053281420025263ddf2bed867e3d36fcddcd6932ad388ba1e63722b13fda7b5705b30097d6c65eb15b0244445

    • SSDEEP

      3072:v/rfzfrPKqSMs4rBzzps/I1eKX8YMtIBTUm53wETEu3:vjfzfrPKqSMnVzzpleKX8YCI1UoPTF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks