General

  • Target

    13838A56D0A201699CD999FDFEA7450D09BCE9F89DB3DBD1AE0C007367DAAE82

  • Size

    1.6MB

  • Sample

    221208-yfqq8aeb7s

  • MD5

    3d8b4cf11c96ecf1387250b460c1616a

  • SHA1

    aea9be6f25cd28a2127322316c3700d811d559fb

  • SHA256

    13838a56d0a201699cd999fdfea7450d09bce9f89db3dbd1ae0c007367daae82

  • SHA512

    582cb6a06e0dfc96c1e4e38a646f72a935a86f7e3c433eb39e8fdab779d9dac3ede574cdd24f8a7c658bded0da46e4cbb81af9f0235b32c126fd9c23b07b0d7c

  • SSDEEP

    24576:/Dgh/8zhJB6YuuWtE4gNHL6YxMTmuxnH2t:/ch/8lz6YN5PxcH2t

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SWIFT_EU.EXE

    • Size

      1017KB

    • MD5

      0bb87df8b4cc8098bae7d574c201d60f

    • SHA1

      303518f8ee040aea50f9f9958294e315aec6cf77

    • SHA256

      d2ca24f7ef22dfa8be6dc45ba0a64350d668bd0b9fb5a7be7d82305313d404bf

    • SHA512

      9a11b65f91c0e561be42e1880336115ecb025acaff0e34ee13799215489e44f0ac648c6a92882a5ccb4c3d4385e4aa3adca7f6e9883248597e0a9490d4af6373

    • SSDEEP

      24576:VDgh/8zhJB6YuuWtE4gNHL6YxMTmuxnH2t:Vch/8lz6YN5PxcH2t

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks