General

  • Target

    payment copy.exe

  • Size

    599KB

  • Sample

    230509-q79peaab2t

  • MD5

    32dd46e3cbfc1c9e871e5b483bd26960

  • SHA1

    42e83ccbfaa4d77c8a31f76a06cb16917d6bd19a

  • SHA256

    fa06c367eea3dc7496e8b8c3baf34ed7775518d1b779d041f41b0a4b92d4a922

  • SHA512

    761d7151eda1977b04091fc743bf7d1d41e2fae85388026b7f3493e5e27e68b123fd930d7ebefa60482f19eaadc0b0642126df2230b21ce13c1e7b883c7635d1

  • SSDEEP

    12288:wNj5AyHCaQghrWfrvvdJsl3WpWEAoskvWr7c/byAxGjJ0u+:w3wDyqfrXQV6AobWURxM0u+

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      payment copy.exe

    • Size

      599KB

    • MD5

      32dd46e3cbfc1c9e871e5b483bd26960

    • SHA1

      42e83ccbfaa4d77c8a31f76a06cb16917d6bd19a

    • SHA256

      fa06c367eea3dc7496e8b8c3baf34ed7775518d1b779d041f41b0a4b92d4a922

    • SHA512

      761d7151eda1977b04091fc743bf7d1d41e2fae85388026b7f3493e5e27e68b123fd930d7ebefa60482f19eaadc0b0642126df2230b21ce13c1e7b883c7635d1

    • SSDEEP

      12288:wNj5AyHCaQghrWfrvvdJsl3WpWEAoskvWr7c/byAxGjJ0u+:w3wDyqfrXQV6AobWURxM0u+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks