General

  • Target

    PO#1132 &1133.zip

  • Size

    436KB

  • Sample

    221123-kba83scb8v

  • MD5

    1333bd7165d7d01913edd4c7ebc866f6

  • SHA1

    0d121c8ce141b4734ccb930b043066fc0c78a7f6

  • SHA256

    d2a14337d5114e189e91736aaaa069410cfae88d3c75c77618c9a7fa2418109a

  • SHA512

    78cbdecbb4d1d9ac726016199c669aa41ebc38ea1ed5ae68f15ea05456f19ead8508fddb753aed067e09672137ae14fffa3de0c2962b8787d74d353fe1cdbb6d

  • SSDEEP

    12288:VW/2nuZ5SSPcPRy7aP1+7xsQRTKC5yvio1f61HyQ+:o/zZVcPRy7aPQ7xsQRKC54FQ1K

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO#1132 &1133.exe

    • Size

      500KB

    • MD5

      66025ac6fd60f45bbeac781a6dd87b0d

    • SHA1

      c18b50db3c100d0adbc7a60530e515eb35483389

    • SHA256

      788c228ea56724227e6eb18a04d36fa4eda9dcfd5a90f1131a54f01ce7445a48

    • SHA512

      14aacfd10e247eca000671364a37de573ec9dc98cd18758a7809a0adb0a9d96df1ebb2d5fd54695cd48fcaed9388eff33a8a50c539cc0576baf734a0a96e6b53

    • SSDEEP

      12288:EW9ABfUnsuZbSSPcLRy70P5+7xsQRTK05+UL/QT3Z7i:EW9uUfZ/cLRy70PU7xsQRK05o7l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks