General

  • Target

    30f64281ea204827b9b7e4ff12a9a7df2463ee0543c258d15b71aeedca30d62d

  • Size

    164KB

  • Sample

    240524-cne4sshf6z

  • MD5

    0c09f22632b14a1d246352824a1f61dc

  • SHA1

    7aa656ea3a49390c20c8bf63e771a40ef11d55bc

  • SHA256

    30f64281ea204827b9b7e4ff12a9a7df2463ee0543c258d15b71aeedca30d62d

  • SHA512

    ec9bf229c38e266d55781a52f2701ecd20f6920d2f710df8646b0b7033b87f516d12657d3fca48bdcc32ef06d491fc96377a75b8dc38c8a60b7cdf7c19ff1f48

  • SSDEEP

    3072:MF/5/266+2eVhEB4Hf1wIP98XzbwoByKLcS/yEMz4D/:MF/5/266lB4NPuXf+KiEMz

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/

Targets

    • Target

      30f64281ea204827b9b7e4ff12a9a7df2463ee0543c258d15b71aeedca30d62d

    • Size

      164KB

    • MD5

      0c09f22632b14a1d246352824a1f61dc

    • SHA1

      7aa656ea3a49390c20c8bf63e771a40ef11d55bc

    • SHA256

      30f64281ea204827b9b7e4ff12a9a7df2463ee0543c258d15b71aeedca30d62d

    • SHA512

      ec9bf229c38e266d55781a52f2701ecd20f6920d2f710df8646b0b7033b87f516d12657d3fca48bdcc32ef06d491fc96377a75b8dc38c8a60b7cdf7c19ff1f48

    • SSDEEP

      3072:MF/5/266+2eVhEB4Hf1wIP98XzbwoByKLcS/yEMz4D/:MF/5/266lB4NPuXf+KiEMz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks