General

  • Target

    exe028.exe

  • Size

    1024KB

  • Sample

    241115-xwpcnayqft

  • MD5

    a49b21d467b3e8f8c8d88fe1ccdb1d72

  • SHA1

    741164a904b72ae9b3774af3a6fb590e331f54f8

  • SHA256

    ed2eee1761fa18877c658efb16afd56a23680cb5c2649ceda8a15c6d47468463

  • SHA512

    1d8e2bb4019e4daa9c6700221827a173fcd3387f121d35a2ae7eccc8cd06ea7f8c5ce93ae18860f80f49992ba1e74690a65fb1bd087f760a7e8423a70e760650

  • SSDEEP

    6144:vHC2F8NXC796TB9vj48tMLnYWorZUhi9jS7BAYjpF4Z:v1eVQkTrvj4tLnYvZki9uBT1F4

Malware Config

Targets

    • Target

      exe028.exe

    • Size

      1024KB

    • MD5

      a49b21d467b3e8f8c8d88fe1ccdb1d72

    • SHA1

      741164a904b72ae9b3774af3a6fb590e331f54f8

    • SHA256

      ed2eee1761fa18877c658efb16afd56a23680cb5c2649ceda8a15c6d47468463

    • SHA512

      1d8e2bb4019e4daa9c6700221827a173fcd3387f121d35a2ae7eccc8cd06ea7f8c5ce93ae18860f80f49992ba1e74690a65fb1bd087f760a7e8423a70e760650

    • SSDEEP

      6144:vHC2F8NXC796TB9vj48tMLnYWorZUhi9jS7BAYjpF4Z:v1eVQkTrvj4tLnYvZki9uBT1F4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks