General

  • Target

    SCANNED COPY.zip

  • Size

    667KB

  • Sample

    221220-kd6g1aha82

  • MD5

    16bbfb9b8df5e1046a2ba28ebf870f61

  • SHA1

    cfd0a928725f01052d49fd703932330d2a0df46c

  • SHA256

    69153f4c0fa2fb13a384e185416154a7ef687a7dac3bceeb3df1df59a2cbeb45

  • SHA512

    e0b5a97914a1f2341cf8650967906ebbd9077975ca563ad37e8ed7e8beaf2d2e435fc46e54b2de981120a831fb1f431439d4f80c540a64843910ecfc898fc767

  • SSDEEP

    12288:uOMpPkJc01BCozIkwhzMuN8RkDfpDa1aa6qRTiO8ia2JQdyzuvBcO7rXZ0vIBQHL:uRp/0Sok38OD0iHUJAyKC67ZU4G

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SCANNED COPY.exe

    • Size

      1021KB

    • MD5

      f81005ba703fb34476ce879d75ec5ab8

    • SHA1

      dd61ce1cdd440dd8a09c039f4729ade2970ba875

    • SHA256

      708854bca2cd2ab2e484b373b82e18a23cb0c0bfd89c4fa6f9ec9b6ee406e4bc

    • SHA512

      a1754b9dcb9b0a3339483aa7deda203073bb1c2644c6078e4537a796c605eafa98c86a5a8ed9b6c206ad9d1a54ddf30b6ff8b4a1b09ccbfc2577c47243287e1f

    • SSDEEP

      12288:jCrehz4X2iNXYoJkwhTMuN8XYDjpVa1Sa6qRTYc8CaSO3PcifOAKjgXZQky:jCrCz4X15v8oDyWZh3PBlKjaZ+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks