General

  • Target

    043eacefa6399975472e184ab45ccc7585d85e30122b5b80987a23a8e489d16e

  • Size

    245KB

  • Sample

    240612-b9lb9sybmh

  • MD5

    2620294207933f8043db9b95cce3e82a

  • SHA1

    fc9299697356965bd8646a5a7435a4766680a82c

  • SHA256

    043eacefa6399975472e184ab45ccc7585d85e30122b5b80987a23a8e489d16e

  • SHA512

    e38deb601c33b9bdea37a6121cee266dc63b94f60deec68f52ddf40818f363f53eec1ba8bab2bbf86dfd7cb647cb1c51021514783043bdc7c3af1f4474a58638

  • SSDEEP

    3072:/GHuUQkoUTq4VLYgEMJ3b71jMvytFH0iM5om+0yy:/RUQkoUbVUgEMJ3VMvsFHH8+l

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      043eacefa6399975472e184ab45ccc7585d85e30122b5b80987a23a8e489d16e

    • Size

      245KB

    • MD5

      2620294207933f8043db9b95cce3e82a

    • SHA1

      fc9299697356965bd8646a5a7435a4766680a82c

    • SHA256

      043eacefa6399975472e184ab45ccc7585d85e30122b5b80987a23a8e489d16e

    • SHA512

      e38deb601c33b9bdea37a6121cee266dc63b94f60deec68f52ddf40818f363f53eec1ba8bab2bbf86dfd7cb647cb1c51021514783043bdc7c3af1f4474a58638

    • SSDEEP

      3072:/GHuUQkoUTq4VLYgEMJ3b71jMvytFH0iM5om+0yy:/RUQkoUbVUgEMJ3VMvsFHH8+l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks