General

  • Target

    13027b54d3f1da32e29814d27a38cea1.bin

  • Size

    615KB

  • Sample

    240609-bt9pxscb66

  • MD5

    c7ab22ff808e0deb7a01ddb682a80a65

  • SHA1

    41d4ce97a179910ab9c72d18bbb23eae3e482d38

  • SHA256

    269b2b2856b7e6701e5850376a1c2fcab85b59be88f81d58802ac7da724ba531

  • SHA512

    efe01445b7302f61e52641c529527554a52b7b49b80f273c3c0895553f9802e6d9788750a432a8f35ddda174702c1eed649e568fbdd5da217186b3421ab05ef1

  • SSDEEP

    12288:Com0hlolVfQYUbdDfiDgIqgFSC35bCUwlqlCfwrL7E41:Com0hl8VfQVbwDqOSWmYjrL7EA

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6398508790:AAFROO4FvHYek5_hchyogAsV7yTvxfINRRg/

Targets

    • Target

      CV Elena Alba Garcia.exe

    • Size

      635KB

    • MD5

      af4c4394fd76d48c76265fa7393dbaf1

    • SHA1

      d08fe29a6362e1416ea464766beb2e5120a8d347

    • SHA256

      4c677969cde4b12fede4247e99653415ccf938d98d4958d99af13193cefab844

    • SHA512

      fa0a58d48584e3547c643c5df0f2783ba73d584306630feb4a9abd32f583df48d25339ed964393e12c52717a33168c9e65ea6b58c6e6525d9ed216952a895738

    • SSDEEP

      12288:Ia9PJCwxBS/ktL8picnoYgwkSpX3MBdkFIyFLkEseB7U5UjJJ++BzqyJM:ICPJCwi/+L84tSpHMBqGydkEseB4eJ+I

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks