General

  • Target

    Offer#129733.zip

  • Size

    436KB

  • Sample

    221123-kba83scb8t

  • MD5

    88d21c204eea8a1932fa37f06f2933b1

  • SHA1

    519c23c59a506c5e63b366c59d1fe66e8c47b2e1

  • SHA256

    752e3bf8736d97adb3c892f1b4b75175788a005ef1a63e248b1d083af0bcfa16

  • SHA512

    ef81de3a29d3f88b93c9709660b4edf930de6ef4c7f8f6926942883c7cfd146a39071af10df1b3f259bb24fdeafaf91cb0d05d1eb3bfd7577a76abbffa8dc189

  • SSDEEP

    12288:dW/2nuZ5SSPcPRy7aP1+7xsQRTKC5yvio1f61HyQl:Q/zZVcPRy7aPQ7xsQRKC54FQ1Z

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Offer#129733.exe

    • Size

      500KB

    • MD5

      66025ac6fd60f45bbeac781a6dd87b0d

    • SHA1

      c18b50db3c100d0adbc7a60530e515eb35483389

    • SHA256

      788c228ea56724227e6eb18a04d36fa4eda9dcfd5a90f1131a54f01ce7445a48

    • SHA512

      14aacfd10e247eca000671364a37de573ec9dc98cd18758a7809a0adb0a9d96df1ebb2d5fd54695cd48fcaed9388eff33a8a50c539cc0576baf734a0a96e6b53

    • SSDEEP

      12288:EW9ABfUnsuZbSSPcLRy70P5+7xsQRTK05+UL/QT3Z7i:EW9uUfZ/cLRy70PU7xsQRK05o7l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks