General

  • Target

    e0ece16177937a72af5678f92fa79d6a9fd01213b33663b46c6106aa3189eb96

  • Size

    371KB

  • Sample

    240521-bvdc4seb4s

  • MD5

    2d3cfe702b5ed5064a086a7c63c9c853

  • SHA1

    b74a924d93f66f0cf71023406a6959afe7a7c385

  • SHA256

    e0ece16177937a72af5678f92fa79d6a9fd01213b33663b46c6106aa3189eb96

  • SHA512

    cc45573b6c805763765b884d3ffa309bc4fd8f83508275a3323372d668afde693894aaa23840da52509054ca726a2ee1ec43fedab36fed9cb57437eaddf274e0

  • SSDEEP

    6144:7IxY3q6emyxIeCc6LK+hRz9Fl7nNjknWlajhgVZfwJPH1Q+9fRQK1oErL:sxY66cMc6LL9v7uWrZfayYfRr1oK

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6760916656:AAFTROumNysgqsjoqAvyBqjbR9y3VV4we2Y/

Targets

    • Target

      e0ece16177937a72af5678f92fa79d6a9fd01213b33663b46c6106aa3189eb96

    • Size

      371KB

    • MD5

      2d3cfe702b5ed5064a086a7c63c9c853

    • SHA1

      b74a924d93f66f0cf71023406a6959afe7a7c385

    • SHA256

      e0ece16177937a72af5678f92fa79d6a9fd01213b33663b46c6106aa3189eb96

    • SHA512

      cc45573b6c805763765b884d3ffa309bc4fd8f83508275a3323372d668afde693894aaa23840da52509054ca726a2ee1ec43fedab36fed9cb57437eaddf274e0

    • SSDEEP

      6144:7IxY3q6emyxIeCc6LK+hRz9Fl7nNjknWlajhgVZfwJPH1Q+9fRQK1oErL:sxY66cMc6LL9v7uWrZfayYfRr1oK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks