General

  • Target

    c13845c5369b753fdd3070b64677c9dfb08de95d66f1a3543a0d6cf1784450ae

  • Size

    83KB

  • Sample

    240511-jp55yahd83

  • MD5

    983592bb18385d5b71675e8186a80521

  • SHA1

    e98a22c35e1297be3c71454d2be7e9ea4cbab6a4

  • SHA256

    c13845c5369b753fdd3070b64677c9dfb08de95d66f1a3543a0d6cf1784450ae

  • SHA512

    c3e36e6b0b1ad15fed22227b83e5554764883fdfc8ac1d2c0663f3bef79cfe23e7778e603127a6f3d6b7f8c9dd023cdeddf44c1d00e02bfccb34f3b75b821acc

  • SSDEEP

    1536:7AX9bm87xZpJ0m76t8xsU/WNmseoanJ4/O8G4Dz15EuDFpgM9laGnz:yl7xZpJ0msU4Hep47DzrEoO6l1nz

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      27896043c515b704ea8c7bfa6bed64e2a8b09cc820205c3ee3c4cdc8988c3f91.exe

    • Size

      236KB

    • MD5

      d29c16478acb56861e08e9c0c2eca08f

    • SHA1

      33257ba2e66b429932b8b8012b8188a7cc8c004c

    • SHA256

      27896043c515b704ea8c7bfa6bed64e2a8b09cc820205c3ee3c4cdc8988c3f91

    • SHA512

      41596107be4287a7864586129b2106a588f93adc65627fb07cd26e895d4293bbaa7e053989f084ee420de71c44f3887759d0094c2db21b3a296af61e2a7c78a3

    • SSDEEP

      3072:72HCph6dLHS1ZTbLTDaSeXYmRpTXAMneEIKhU5f3lFhvt:7rh6dLy1ZTbLTDaSsRD1eEIKh6VFp

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks