General

  • Target

    11811bd824fed937c466a829d1910fba240b6ee9686498bd473d5667191de6a4.exe

  • Size

    216KB

  • Sample

    241122-y3deeaxrfz

  • MD5

    6ff9dc3e2e5c0def34ccda17f8283b77

  • SHA1

    23e70915c5dd9811ee622f47c73994360919de48

  • SHA256

    11811bd824fed937c466a829d1910fba240b6ee9686498bd473d5667191de6a4

  • SHA512

    87c8ab53c3e7734e1081b95955c6def88f7082c5a2daf2f6f4fd86fffbb9dc0d6150b73335d3dc12502b2690b48486c5aa7dd30e53e72fde4100314c750333f3

  • SSDEEP

    6144:4eYMz+FU7+m+VEPorCl09wr3WeQX7lVyUHs:4eYMKs+APNl09C3srnjs

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      11811bd824fed937c466a829d1910fba240b6ee9686498bd473d5667191de6a4.exe

    • Size

      216KB

    • MD5

      6ff9dc3e2e5c0def34ccda17f8283b77

    • SHA1

      23e70915c5dd9811ee622f47c73994360919de48

    • SHA256

      11811bd824fed937c466a829d1910fba240b6ee9686498bd473d5667191de6a4

    • SHA512

      87c8ab53c3e7734e1081b95955c6def88f7082c5a2daf2f6f4fd86fffbb9dc0d6150b73335d3dc12502b2690b48486c5aa7dd30e53e72fde4100314c750333f3

    • SSDEEP

      6144:4eYMz+FU7+m+VEPorCl09wr3WeQX7lVyUHs:4eYMKs+APNl09C3srnjs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks