General

  • Target

    TT SWIFT COPY.zip

  • Size

    767KB

  • Sample

    221205-ryznhshf29

  • MD5

    997bb0139b7271880d1b5e841dc41baa

  • SHA1

    ec20f0ae79f2bff892edf6fcb70cb0922b9447a2

  • SHA256

    af1e6ca25c063960be38376bd7890411acd5e9ea7589fba181909bf7b7fd0144

  • SHA512

    c36bfbd6f9cf6c2666699ce53f7b7feeefa5896536043fd485a360d4a6a8ab7ce2c9f36a103f821c7b643362bb9af05cd2d901a3dff872159c221b2f8f1b88b6

  • SSDEEP

    12288:cF804U7a3iJm21Kvr81SEMFIifYKp3N7k9KR6WEMxy2THXV5NhsqBy5Y0y:cH4U7vJJ1MDH3Px/TFpsYy5Ly

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      TT SWIFT COPY.exe

    • Size

      1.0MB

    • MD5

      8bfedcd7d025aa96faa2334b5b85d959

    • SHA1

      a1b8959fb7b4d32a3adae8071f3a1bb581879737

    • SHA256

      fc41cb9d33a84a20e437091bf78e00938e4b5adb003f6c86370e975912d74dba

    • SHA512

      d40049e5e05ade2a73f3dd0fa31273aa4a060eb661ffbda983053d2642b574a14d46cba280f699a16d104a807921941e6ced71774e0eb36323671b7590415662

    • SSDEEP

      12288:ezlTteyx4xi85V4O4O5R2+nM87kzJNolKR6HkSwx7IkNu07k9md6WqmxyeTHXb5M:UCxRd2s/VlKcZw+mu0xjTrpq8y5dH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks