General

  • Target

    3bf975da6c178a0ca6458e493fce81bea96e059e333ed596c3101dbb408eaad5

  • Size

    3.5MB

  • Sample

    241115-clt5yazqfp

  • MD5

    806e51293e3b35ada07cb8c98f925f15

  • SHA1

    d95d7e0fcd11b886c1d06a52cfbb988c7cd80213

  • SHA256

    3bf975da6c178a0ca6458e493fce81bea96e059e333ed596c3101dbb408eaad5

  • SHA512

    f2857cfafa13b68ba269091e3f2605b53f79aff8750b9585e59a66dd36cea70a69e168f665591127c6ee3a224046ea1c8fa1d099c4cfc979c82d842ac7fa04b2

  • SSDEEP

    98304:jAo9y3OvpJwg0K2c/iiWOvpJwg0K2c/ii:1TwPcHrwPcH

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3bf975da6c178a0ca6458e493fce81bea96e059e333ed596c3101dbb408eaad5

    • Size

      3.5MB

    • MD5

      806e51293e3b35ada07cb8c98f925f15

    • SHA1

      d95d7e0fcd11b886c1d06a52cfbb988c7cd80213

    • SHA256

      3bf975da6c178a0ca6458e493fce81bea96e059e333ed596c3101dbb408eaad5

    • SHA512

      f2857cfafa13b68ba269091e3f2605b53f79aff8750b9585e59a66dd36cea70a69e168f665591127c6ee3a224046ea1c8fa1d099c4cfc979c82d842ac7fa04b2

    • SSDEEP

      98304:jAo9y3OvpJwg0K2c/iiWOvpJwg0K2c/ii:1TwPcHrwPcH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks