General

  • Target

    PI.exe

  • Size

    671KB

  • Sample

    221206-h4yhzaee26

  • MD5

    f98d644ab8f19948187c6189918dcc1c

  • SHA1

    99ef151d996ed3f09e66891ae304a2f36299dd39

  • SHA256

    3a5e2c67c21dcfb129ce78a036ae4bf136a05493001ad7326c7fe9aab6a444e7

  • SHA512

    f2ba2a292e0eff9cc8490c2147293d13183acd0aad66ef58ede5d3720fe37960ca27cc4ef9c7d9327cb0c9256ec1c963e3292bcce889ddbc186aaec500abfe8e

  • SSDEEP

    12288:XPuYd+V6b1momPZefcZnhYy8kL2JDiyllunMeZhJITR3oIxWgSaMPuYd+V6b:XPuYd+V6bIomxichF8kL26nLhJITR4Is

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PI.exe

    • Size

      671KB

    • MD5

      f98d644ab8f19948187c6189918dcc1c

    • SHA1

      99ef151d996ed3f09e66891ae304a2f36299dd39

    • SHA256

      3a5e2c67c21dcfb129ce78a036ae4bf136a05493001ad7326c7fe9aab6a444e7

    • SHA512

      f2ba2a292e0eff9cc8490c2147293d13183acd0aad66ef58ede5d3720fe37960ca27cc4ef9c7d9327cb0c9256ec1c963e3292bcce889ddbc186aaec500abfe8e

    • SSDEEP

      12288:XPuYd+V6b1momPZefcZnhYy8kL2JDiyllunMeZhJITR3oIxWgSaMPuYd+V6b:XPuYd+V6bIomxichF8kL26nLhJITR4Is

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks