General

  • Target

    1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1

  • Size

    744KB

  • Sample

    240525-g1smwaha9w

  • MD5

    eef51809b76c7da0e209722e13ca4cba

  • SHA1

    fe00cb9567ef784a9908c6f5fb1752dcaecaf42b

  • SHA256

    1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1

  • SHA512

    4e08b37accd59293e06aa17d0b8c60b355c21aa357de2edfe757cbc1213ff58df38b2704046932913b9f16aa2a8eaf32dc1baa8bb6738b82a931c790a48a0df3

  • SSDEEP

    12288:ZOgRbLx1MCrsXFwUApOl3MuQF0oo3bCvJz3e45D+Ur4DNXBhpaWIP:Z3lA7TSOeuQu2xz3ejUr4hD89

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1

    • Size

      744KB

    • MD5

      eef51809b76c7da0e209722e13ca4cba

    • SHA1

      fe00cb9567ef784a9908c6f5fb1752dcaecaf42b

    • SHA256

      1b1ed0ca854f22b7075e848d4781bbcec905e5eb65e7df69c8354e2afbf46fd1

    • SHA512

      4e08b37accd59293e06aa17d0b8c60b355c21aa357de2edfe757cbc1213ff58df38b2704046932913b9f16aa2a8eaf32dc1baa8bb6738b82a931c790a48a0df3

    • SSDEEP

      12288:ZOgRbLx1MCrsXFwUApOl3MuQF0oo3bCvJz3e45D+Ur4DNXBhpaWIP:Z3lA7TSOeuQu2xz3ejUr4hD89

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks