General

  • Target

    SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exe

  • Size

    828KB

  • Sample

    221129-jgdqqahe27

  • MD5

    800ad195e5fb86784cc72208a2eb3e47

  • SHA1

    8547bb4c6ff1a37fce2ecfc0e31ce9441d76964c

  • SHA256

    7d12f2ba49fa84ea8e2db0a6cad3db2ef817d808ce19b47a98e1fb02cba2760f

  • SHA512

    57d28106f3c9752dc7a4c42a4ab1460bbd8031d23ab071f2459f683dbd4d16f53a46fdbb7989ca2415307f80275c7dfcbda504c610019b948c2d08942c4908da

  • SSDEEP

    12288:y7qeQuSTi89eHFr5cE8LHWu/SEdRMA/LyVu6gt0IPPet5G5SZ9B7tLgEBwwu:wwvihcvLF9/L1t0InerZ1xqwu

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exe

    • Size

      828KB

    • MD5

      800ad195e5fb86784cc72208a2eb3e47

    • SHA1

      8547bb4c6ff1a37fce2ecfc0e31ce9441d76964c

    • SHA256

      7d12f2ba49fa84ea8e2db0a6cad3db2ef817d808ce19b47a98e1fb02cba2760f

    • SHA512

      57d28106f3c9752dc7a4c42a4ab1460bbd8031d23ab071f2459f683dbd4d16f53a46fdbb7989ca2415307f80275c7dfcbda504c610019b948c2d08942c4908da

    • SSDEEP

      12288:y7qeQuSTi89eHFr5cE8LHWu/SEdRMA/LyVu6gt0IPPet5G5SZ9B7tLgEBwwu:wwvihcvLF9/L1t0InerZ1xqwu

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks