General

  • Target

    84f0d8dc70167b92ecd20d985853064f6b0af8eaf3a39736256c3da225c06ec6

  • Size

    655KB

  • Sample

    241115-cpm6sszrck

  • MD5

    98fa5a98dd08ff977e2b8569d0e5d06b

  • SHA1

    cfb65dbeccee38aa1d0e52376dc5ec51686ee90a

  • SHA256

    84f0d8dc70167b92ecd20d985853064f6b0af8eaf3a39736256c3da225c06ec6

  • SHA512

    fcf388854023bbb74c6cee00dd2fbbd9942e3385c1376c9ae3e3bc4df73229b16ec3c9d7bd150143faaef09b773acaef95d4d4b969ff2a81c6f4da636556f9b2

  • SSDEEP

    12288:jpQWbRAiDZeC16ADElhFwO75mnbpiuFAtRz3hGwHHEVzWZKuR6o:j5hDUKDEPFIguytRz3hGkkVfugo

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6852245174:AAHgk_9s-tH6YNacTaCnQz56uJMggI0fZDw/

Targets

    • Target

      image_25.exe

    • Size

      769KB

    • MD5

      e46e492f9d98a484988f6f250c259fff

    • SHA1

      276527beffd70654b3b3ebdf8f65721a9834efc5

    • SHA256

      4ca5d1f4f3b52383886d6338b63b138961fc496a70a98c4e2e0a1bf1d6f646d6

    • SHA512

      0ad7851651f57747e815e8e70dc04da14fe6d0d96f6cffcf69858e57e7ff90133dacc308751edc177945678fe1cacebb6ecca285b32d82a162f9e397df03168a

    • SSDEEP

      12288:P4PyCJVMC1T7mTDesFxz1+ZHDhNOONb8i3HMl9sn0XMWR/whOxf87h:QPyCJVzpqDesZ+VDhNOOxV30tXRpwws

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks