General

  • Target

    PI#102087.zip

  • Size

    625KB

  • Sample

    221128-pgtptsce27

  • MD5

    c4ac79567145c70e412460570fef71ef

  • SHA1

    29fd3be8fa14ef453417b05fe53592e8688d286a

  • SHA256

    497b79c21443e72aac5945077aa20d373b102114036cecb96c85c61aad0fcacd

  • SHA512

    894bde9b0191b682f15254f2ed1477c3af361bd30113ac5a69b9cbfec7084a281f6b9c3bbb0951ce8ecf14a53168ae32446e8f5fc880742e071a12d2a37caf93

  • SSDEEP

    12288:MwRbmxaSaPnTakUO2G920LTMBYS3wq6fkGw2ArzHtUflh2Y/ADpZf4Demz:rOCTaQ94BpTyhwxrzadT/iZfmz

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PI#102087.exe

    • Size

      807KB

    • MD5

      40264f53f0f83bfd21df75e22db2b0ea

    • SHA1

      93171e1bd1c33212724b3b3e5238f0c83531fc7e

    • SHA256

      caef9e906b0768d4134a8fc2a9523554b23bb9980668c299106d1ace32cbbaef

    • SHA512

      7f7f85a39e3bce3f3c0465c97a3367f2d2860bfeb67d3f7a17f8342c7742d1280681fdefda5d1f418f64da22b7e6877e677134d8c36628389c06f4465fe9bfd6

    • SSDEEP

      24576:NU676CSkFg/IyXt5TKhwlZzE9H/0XPG5X:KlkoXfxZsf6Q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks