General

  • Target

    swift copy.rar

  • Size

    567KB

  • Sample

    230524-m27q3scb23

  • MD5

    063fad21455004522c9529736d53049e

  • SHA1

    c6eec8554b47605009127a5f0aced8250da99671

  • SHA256

    5003799036b9d33629f5fc68ca1e96b3cef932e9509a9379aa43f67c71eaa646

  • SHA512

    458730fdee9e904cb07bcfca26d693c291bf2167611a13054e35eb3905c1f9092bb9b995df3dcfbf5cb85edf3d9936f1d4460211ba90ac1334d2cacebe73a699

  • SSDEEP

    12288:EzTyuz+ssJwBL+PBT9ZMT/t5dr7AwhHuerGCPxG6M8IUyKJ59:0bsWBL8cZ77Vw6lrFV

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      swift copy.exe

    • Size

      625KB

    • MD5

      ab750433a701a0adc0de1dcf3cc28260

    • SHA1

      909e6e5ca001f17019074588ff4faf1aed797f99

    • SHA256

      db8ded95368e19345c3bfa43f81087cc61dcf2611881eff049dd54969d9f31b1

    • SHA512

      6a575e7e8f9fc8b4bcf104a05d2deb023c45dbcf4c421f6bb0477cb6324466203844eb8a12ef96802e97231bb615cf54912ace8c6cd21f3976f6aa65dd586579

    • SSDEEP

      12288:CdtPplTY6RhKuVVwfPnGQuMiYnf/1mY/LXBtU8MqylQ381S:CdJTDETffbuVa1mATBtUgyVI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks