General

  • Target

    9f2b06a5d492309cf77d733de90f608137768aa23391fc124342800ba0227d85

  • Size

    681KB

  • Sample

    250121-ffhrhaxma1

  • MD5

    74f873140812d011828afdaa9fde9d05

  • SHA1

    88d442f547edc7a8a66e9d8e387ebd5be6351862

  • SHA256

    9f2b06a5d492309cf77d733de90f608137768aa23391fc124342800ba0227d85

  • SHA512

    d6f0459d9ec6259de48cdbcd29f8b6affd2e5320c1ae2d965360701be45c478776a9df6e2ea3cbabb9688c25d175e668284405cf572687c4b174da7b37dcc5ff

  • SSDEEP

    12288:meQl9XNqpyoKtyXfvL8SW6+0nh8gymF0l2IR6WdQiYL/T+4X60j:Gl9XNqxUyXfvH+kDF0lloWdQ7b+4Dj

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6852245174:AAHgk_9s-tH6YNacTaCnQz56uJMggI0fZDw/

Targets

    • Target

      FOR 817 4429601.exe

    • Size

      851KB

    • MD5

      cbcac7423afa2b0dc72712763a4e1eb3

    • SHA1

      39f3a89371412b93e4cdb7df7212c0290e4bfd22

    • SHA256

      e085c2b585c5a43e93001485c6ec2fe56e9cd8b7b509f971ff0072c7f1a1a99e

    • SHA512

      9456ff5bf3ca861644232b43dc5afba6ac853a73bd9ba2d2257c0c333992dbfeca3ac8268ff8bb2d4d8265f9bd3665fd2bf6ef46c3b95b0b1edd74ecee4972eb

    • SSDEEP

      12288:KKOlbxrh0IO8DfymhIB5HPAw0nhAaoKF0l2XqbVRr+QHZjcXUpS8tJP:O/fymm5H4w0XF0lyqXtjuUpS8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks