General

  • Target

    151e17f3b34f756861aa170278e99dfec0e37f6600f2dbf6d33e3ce20711cc5f

  • Size

    1.5MB

  • Sample

    250112-bwrbcs1mgr

  • MD5

    67004f147da8a2b94996fd910e71e22c

  • SHA1

    99d7275c710974bab51a1e0ec761449e33668f62

  • SHA256

    151e17f3b34f756861aa170278e99dfec0e37f6600f2dbf6d33e3ce20711cc5f

  • SHA512

    552e6f85e2164f9df2031b732de46e110c8204fa74b3509250e47735f1f8866f3fd79bbf40df7b3280fe3987253995be53f7a777be4cc13a07e5f2aec9c28244

  • SSDEEP

    24576:i3HzKiEdgArBAyaaMNeyydJO1NtH8Po/v1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:i3T4gArBdGBynO1z8PopjLoyEkmZ9Y14

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      151e17f3b34f756861aa170278e99dfec0e37f6600f2dbf6d33e3ce20711cc5f

    • Size

      1.5MB

    • MD5

      67004f147da8a2b94996fd910e71e22c

    • SHA1

      99d7275c710974bab51a1e0ec761449e33668f62

    • SHA256

      151e17f3b34f756861aa170278e99dfec0e37f6600f2dbf6d33e3ce20711cc5f

    • SHA512

      552e6f85e2164f9df2031b732de46e110c8204fa74b3509250e47735f1f8866f3fd79bbf40df7b3280fe3987253995be53f7a777be4cc13a07e5f2aec9c28244

    • SSDEEP

      24576:i3HzKiEdgArBAyaaMNeyydJO1NtH8Po/v1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:i3T4gArBdGBynO1z8PopjLoyEkmZ9Y14

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks