General

  • Target

    IMG1128061077.exe

  • Size

    1.1MB

  • Sample

    221125-smwyxsah4w

  • MD5

    c2f09ea4f30b3487f2361cf37732191f

  • SHA1

    a437c48bb287e6a5f86aa83165c3720b7431f6e7

  • SHA256

    d8d32922ddd6305ce4acc9c970e0a6d1c5866d344496be1620498ea035e9baf7

  • SHA512

    0dd4a64880ec25c0ddd45447cc3a5c55854cc68ecf873f76b7785328dfcc0c6e8511640b153badba15097f71257f0b68945fe64af43b70d2de48d74d24c3aa4a

  • SSDEEP

    24576:LAOcZXMu15QjEBv0BbJswG5cFu4KnmdMLFspB6Q7CqFHd:Nc5QjEBv0BWd5c4nmdMLE8Q77

Malware Config

Extracted

Family

agenttesla

C2

http://107.189.4.253/zipone/inc/10c5bcaaef047d.php

Targets

    • Target

      IMG1128061077.exe

    • Size

      1.1MB

    • MD5

      c2f09ea4f30b3487f2361cf37732191f

    • SHA1

      a437c48bb287e6a5f86aa83165c3720b7431f6e7

    • SHA256

      d8d32922ddd6305ce4acc9c970e0a6d1c5866d344496be1620498ea035e9baf7

    • SHA512

      0dd4a64880ec25c0ddd45447cc3a5c55854cc68ecf873f76b7785328dfcc0c6e8511640b153badba15097f71257f0b68945fe64af43b70d2de48d74d24c3aa4a

    • SSDEEP

      24576:LAOcZXMu15QjEBv0BbJswG5cFu4KnmdMLFspB6Q7CqFHd:Nc5QjEBv0BWd5c4nmdMLE8Q77

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks