General

  • Target

    d16e362431692632ebb42007262ccb4f81b1ae8d8c7f1608b8d5b5b36d9fa21c

  • Size

    263KB

  • Sample

    240521-bvdnwadg45

  • MD5

    5ad95d14d6737df6422c30ce1e881676

  • SHA1

    9e3c3c6a28ad01d2b177de823b4dbe727d6af964

  • SHA256

    d16e362431692632ebb42007262ccb4f81b1ae8d8c7f1608b8d5b5b36d9fa21c

  • SHA512

    4fc1d56af665cb390843c602a06295baa2b10c73ad9ab4a744efce90582ac384411dedc537edd1a6905ea20774d88361464e8da389d83566bc00b10f5e6bba68

  • SSDEEP

    6144:UptJNtOjJ88W0vIjD6/pVXQmvPNyCs65QheHt/7tnyoQkC8:ypLn0vI3uf1yCs6KYHt/1yhu

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6760916656:AAFTROumNysgqsjoqAvyBqjbR9y3VV4we2Y/

Targets

    • Target

      Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe

    • Size

      371KB

    • MD5

      2d3cfe702b5ed5064a086a7c63c9c853

    • SHA1

      b74a924d93f66f0cf71023406a6959afe7a7c385

    • SHA256

      e0ece16177937a72af5678f92fa79d6a9fd01213b33663b46c6106aa3189eb96

    • SHA512

      cc45573b6c805763765b884d3ffa309bc4fd8f83508275a3323372d668afde693894aaa23840da52509054ca726a2ee1ec43fedab36fed9cb57437eaddf274e0

    • SSDEEP

      6144:7IxY3q6emyxIeCc6LK+hRz9Fl7nNjknWlajhgVZfwJPH1Q+9fRQK1oErL:sxY66cMc6LL9v7uWrZfayYfRr1oK

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks