General

  • Target

    2d0ddb1cd7975ca889ab6359888d4bb1a7cecd1afbbf411b21dfbfeabf5353e9

  • Size

    686KB

  • Sample

    240912-xd1yqsydlc

  • MD5

    26004b988ecff458b5e234122e34e29d

  • SHA1

    4ca844dd2d3e4c2f6fd548c274001cc7cdb072f4

  • SHA256

    2d0ddb1cd7975ca889ab6359888d4bb1a7cecd1afbbf411b21dfbfeabf5353e9

  • SHA512

    9dcad1cdc71a3390e278a3ebdda05c2b363b36117b7e13e8e9483ea3bee18edd1c6328055c3d0058e3eefad150d7d923182caaec310ab6c75c8c9b78a2c54e46

  • SSDEEP

    12288:7Viwt5mehMQM7ywvwfN1NhFRxkvLDQY/LBxGGRd4XDQMX8miPoXH:JiwY778NHTgLDR/LeYWXcMX8miPo

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5411974807:AAHPmEnh0nziodgxewx85KsGBlVBdQv4qug/sendDocument

Targets

    • Target

      2d0ddb1cd7975ca889ab6359888d4bb1a7cecd1afbbf411b21dfbfeabf5353e9

    • Size

      686KB

    • MD5

      26004b988ecff458b5e234122e34e29d

    • SHA1

      4ca844dd2d3e4c2f6fd548c274001cc7cdb072f4

    • SHA256

      2d0ddb1cd7975ca889ab6359888d4bb1a7cecd1afbbf411b21dfbfeabf5353e9

    • SHA512

      9dcad1cdc71a3390e278a3ebdda05c2b363b36117b7e13e8e9483ea3bee18edd1c6328055c3d0058e3eefad150d7d923182caaec310ab6c75c8c9b78a2c54e46

    • SSDEEP

      12288:7Viwt5mehMQM7ywvwfN1NhFRxkvLDQY/LBxGGRd4XDQMX8miPoXH:JiwY778NHTgLDR/LeYWXcMX8miPo

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks