General

  • Target

    fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31

  • Size

    152KB

  • Sample

    240512-byrd5sdb67

  • MD5

    c7013dfcdeda020d9e90786e7b0ed0ad

  • SHA1

    dae80a192e1acb80b6199d19b64eb19afc57d169

  • SHA256

    fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31

  • SHA512

    0c66a2490a4bdd5af62ca28ff3c84c22e5953f257d39b1de16ae0d3f0a4a22876b9f2e7f37beb51789849c23f06aa29439d1f756bad176a05a76040f0dd5316e

  • SSDEEP

    3072:ovNRUMcuby5K1ZW09rITytApFUKjbob69D:oFRhV25II5pFVH86

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/

Targets

    • Target

      fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31

    • Size

      152KB

    • MD5

      c7013dfcdeda020d9e90786e7b0ed0ad

    • SHA1

      dae80a192e1acb80b6199d19b64eb19afc57d169

    • SHA256

      fc244bfab8a53ea824ec9de5a0962a62567a484dfabafcc7900068fef3d07d31

    • SHA512

      0c66a2490a4bdd5af62ca28ff3c84c22e5953f257d39b1de16ae0d3f0a4a22876b9f2e7f37beb51789849c23f06aa29439d1f756bad176a05a76040f0dd5316e

    • SSDEEP

      3072:ovNRUMcuby5K1ZW09rITytApFUKjbob69D:oFRhV25II5pFVH86

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks