General

  • Target

    INVOICE1.exe

  • Size

    141KB

  • Sample

    241014-jhfxgasbma

  • MD5

    a95881a2ba2d6d3fbc144d3c1edffe7d

  • SHA1

    0ba33b11cd141b3583bab5d5d59b99c470cdfed1

  • SHA256

    4cc555d5f883d5970deca28b1f2e50c7adb4989a8caa653ad496d587e47f0f7c

  • SHA512

    1820b626adf3034f21f1517ab5f150e8c90e671f90c001f827a2b000b5abe8c504eeafd0b57b827ce1e82a651f30513e515f2a69f2f96ce62207645bf4c2bd19

  • SSDEEP

    3072:ns/N4OotOvCHzy+OJf3uq+BD9R0XSusK8q5wa8xx/:ns/N4OotOvCHzyz2q+BD9RS3e

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6828335029:AAHOq6iD_8Eg5u6FhmWF0NHPcKj1jLGtRk4/

Targets

    • Target

      INVOICE1.exe

    • Size

      141KB

    • MD5

      a95881a2ba2d6d3fbc144d3c1edffe7d

    • SHA1

      0ba33b11cd141b3583bab5d5d59b99c470cdfed1

    • SHA256

      4cc555d5f883d5970deca28b1f2e50c7adb4989a8caa653ad496d587e47f0f7c

    • SHA512

      1820b626adf3034f21f1517ab5f150e8c90e671f90c001f827a2b000b5abe8c504eeafd0b57b827ce1e82a651f30513e515f2a69f2f96ce62207645bf4c2bd19

    • SSDEEP

      3072:ns/N4OotOvCHzy+OJf3uq+BD9R0XSusK8q5wa8xx/:ns/N4OotOvCHzyz2q+BD9RS3e

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks