General

  • Target

    144fb79c3d4131bb67e0c761274ec5f3bc67a5931bf1663daf2d447eb75cacad

  • Size

    1.3MB

  • Sample

    240702-bq89zsvdnl

  • MD5

    c6197964134eed7eb3eceb7167f17e36

  • SHA1

    e3f5db78709fcf60e11e6d93949a0668a5020c41

  • SHA256

    144fb79c3d4131bb67e0c761274ec5f3bc67a5931bf1663daf2d447eb75cacad

  • SHA512

    1d42ef37d793978e24cd3bb8fde7a59e009b119448b7e05c5b6dfd937058c5252b9088d7c03a7f1e041ad5069b2d993fa3879a6cdf834cdfc90329aaffdf41f8

  • SSDEEP

    12288:wo1j7VAcgy292RPAlgdpBYtFlg8GlSuVhbsus7dEi:9rgy2WAGdpwlg8GlSIhbsuQEi

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot2049439171:AAHTF-OzMCy9i3S0b0hmaVc_mUsY0h6Ue_w/sendDocument

Targets

    • Target

      144fb79c3d4131bb67e0c761274ec5f3bc67a5931bf1663daf2d447eb75cacad

    • Size

      1.3MB

    • MD5

      c6197964134eed7eb3eceb7167f17e36

    • SHA1

      e3f5db78709fcf60e11e6d93949a0668a5020c41

    • SHA256

      144fb79c3d4131bb67e0c761274ec5f3bc67a5931bf1663daf2d447eb75cacad

    • SHA512

      1d42ef37d793978e24cd3bb8fde7a59e009b119448b7e05c5b6dfd937058c5252b9088d7c03a7f1e041ad5069b2d993fa3879a6cdf834cdfc90329aaffdf41f8

    • SSDEEP

      12288:wo1j7VAcgy292RPAlgdpBYtFlg8GlSuVhbsus7dEi:9rgy2WAGdpwlg8GlSIhbsuQEi

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Email Collection

1
T1114

Tasks