General

  • Target

    f20bef5379fa7ef61271c9b73a3d324b998daadb24e9d3c3e3945af30599b6b9

  • Size

    1.4MB

  • Sample

    250123-bkjgdavlfw

  • MD5

    d0eeefd75cb5573f52dc3140ebdd7fd8

  • SHA1

    d91c2c105265b3659afe7d0512942db0b84b7673

  • SHA256

    f20bef5379fa7ef61271c9b73a3d324b998daadb24e9d3c3e3945af30599b6b9

  • SHA512

    1c20ead97a91d86065bb5994f885001a582fa47ea4ea20cdb39a1b10c8393283a265522c2253686d0ffc45030bd000061236e86e8d436755347bf3b67c4a9999

  • SSDEEP

    24576:76aOdKRRPWEeeRS46SFtWcukfYblAwzWfm5N7Q:76a8KgeRN6S/WcTMulm5NE

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7351654760:AAFbpZoZSrKZKoCJV2by7hbyBL3xnGEoUrU/

Targets

    • Target

      Statement Of Account/Statement Of Account.exe

    • Size

      2.3MB

    • MD5

      957ed991a2f4e85db4dbda7130ce56dc

    • SHA1

      1420f36644d36748adb1b5cfe6aa33aa3971fd52

    • SHA256

      f73f8e208a1920512e2901a54d5907a10d1dfb7fcbe101a7bdee3971460c866e

    • SHA512

      eb9f6e3038245119f8436316fa52e3d4f4551928b5120aafd7c42303b137769721dfac5140f5b282444b10824cc046e6e9d835627a335288a52ded886548ccb1

    • SSDEEP

      24576:FOwZOF4dytQN1rETCNG+IzY8AAloY+GNtWuW03QbDAw3WfYtNhPu:oSOmdytQN1rEmqiAl9+GHWuV8sZYtN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks