General

  • Target

    Swift Copy.exe

  • Size

    937KB

  • Sample

    230329-2cg7fsab39

  • MD5

    3925b6940981e84c6b7ae34c106120f5

  • SHA1

    a2e73c671b66d29f3ca96645ab01e72cebca1a74

  • SHA256

    9491bf7eb218403c98932e34e46d4f7162055afc3792db3c78e66f5455d043f5

  • SHA512

    012eff14582cea40075d9f4f40ecc7e84e299d9ea448e8bc5e0b85f012acf6d978a7df1240f21491c6bbd7b992feb188af49b25317c67544d51ec5e010314246

  • SSDEEP

    24576:s/K+CS1g/jBD+oxoBMVVaMqkYD8Yt7O6BFG:syxS1SsxMVVaMbYt7Jr

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Swift Copy.exe

    • Size

      937KB

    • MD5

      3925b6940981e84c6b7ae34c106120f5

    • SHA1

      a2e73c671b66d29f3ca96645ab01e72cebca1a74

    • SHA256

      9491bf7eb218403c98932e34e46d4f7162055afc3792db3c78e66f5455d043f5

    • SHA512

      012eff14582cea40075d9f4f40ecc7e84e299d9ea448e8bc5e0b85f012acf6d978a7df1240f21491c6bbd7b992feb188af49b25317c67544d51ec5e010314246

    • SSDEEP

      24576:s/K+CS1g/jBD+oxoBMVVaMqkYD8Yt7O6BFG:syxS1SsxMVVaMbYt7Jr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks