General

  • Target

    tmp

  • Size

    872KB

  • Sample

    230310-zva5rahb5t

  • MD5

    6e4c51c65c966531518f3ace3499ade7

  • SHA1

    79920fbff850c5a632e0e2b43ff400f13a8a6238

  • SHA256

    da56d8f4ee82eaeb593bd5cd320e4d544163c674e26031edb6bd5c409953b2eb

  • SHA512

    57915ac32b27a793a98071731140466678316364192d9ab98abdb8bf243f34d47c040b6bd970a1e854c40f2801a134391af44529cbdc6672490bf283d61acabb

  • SSDEEP

    12288:9ZGQ4l+T38LYYOyTFW2HqIcUrMQEsVuggBP3ABZbzQLKHdHz0:mQ4S8YzGHGMMQEscggBIBF8KH

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      tmp

    • Size

      872KB

    • MD5

      6e4c51c65c966531518f3ace3499ade7

    • SHA1

      79920fbff850c5a632e0e2b43ff400f13a8a6238

    • SHA256

      da56d8f4ee82eaeb593bd5cd320e4d544163c674e26031edb6bd5c409953b2eb

    • SHA512

      57915ac32b27a793a98071731140466678316364192d9ab98abdb8bf243f34d47c040b6bd970a1e854c40f2801a134391af44529cbdc6672490bf283d61acabb

    • SSDEEP

      12288:9ZGQ4l+T38LYYOyTFW2HqIcUrMQEsVuggBP3ABZbzQLKHdHz0:mQ4S8YzGHGMMQEscggBIBF8KH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks