General

  • Target

    transfer swift.exe

  • Size

    883KB

  • Sample

    221003-p47vzagcdp

  • MD5

    13ddbf45fdb72d47271b493c20c12e37

  • SHA1

    f041389e3bdcf9269db04f6511edee6fdec39f74

  • SHA256

    d3f62222b9461a8a06f0e12e29ad609a6c902da7fd488e7df36668a12987b9e2

  • SHA512

    e2c17afb6433f0d544a1da5183099039b89a0068aaacad66ad62fdc2a2eeda2fc1267fe170d80dd6388b44567503bddc4a92af3cb5069ae8c9427790d1472ab0

  • SSDEEP

    12288:IEhcEmRULzEu6KCJy2BBVmXOHQZuXoK1rgkgneK4HTN:1e7RU2KCJy2T8+HQZO71v

Malware Config

Targets

    • Target

      transfer swift.exe

    • Size

      883KB

    • MD5

      13ddbf45fdb72d47271b493c20c12e37

    • SHA1

      f041389e3bdcf9269db04f6511edee6fdec39f74

    • SHA256

      d3f62222b9461a8a06f0e12e29ad609a6c902da7fd488e7df36668a12987b9e2

    • SHA512

      e2c17afb6433f0d544a1da5183099039b89a0068aaacad66ad62fdc2a2eeda2fc1267fe170d80dd6388b44567503bddc4a92af3cb5069ae8c9427790d1472ab0

    • SSDEEP

      12288:IEhcEmRULzEu6KCJy2BBVmXOHQZuXoK1rgkgneK4HTN:1e7RU2KCJy2T8+HQZO71v

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks