General

  • Target

    Remittance Copy.exe

  • Size

    679KB

  • Sample

    230530-qsekqaab2t

  • MD5

    affce132a27adf2d4a2ee5c468cb32c5

  • SHA1

    b74fc8146da6a80b7c3f717900825783d419c31a

  • SHA256

    bc7cedbf17f2a3b0cceaf8fbeab3a8a38953d1b64b17d89de74bec0c380516f2

  • SHA512

    680c71309cd6b1b4261b74fb0486731b9ce227371bddd62b5ee05dfd5f9b02a8a491d2004dbc96eca867d85902515a8b13153a8df66c6051da8eb15024d4ca88

  • SSDEEP

    12288:okKvYhp1x0cO7t9qmvm0evA7ucbGh7sNqkH5y9CSte3u:okKvi1x0cOj9v5ih7Z79

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Remittance Copy.exe

    • Size

      679KB

    • MD5

      affce132a27adf2d4a2ee5c468cb32c5

    • SHA1

      b74fc8146da6a80b7c3f717900825783d419c31a

    • SHA256

      bc7cedbf17f2a3b0cceaf8fbeab3a8a38953d1b64b17d89de74bec0c380516f2

    • SHA512

      680c71309cd6b1b4261b74fb0486731b9ce227371bddd62b5ee05dfd5f9b02a8a491d2004dbc96eca867d85902515a8b13153a8df66c6051da8eb15024d4ca88

    • SSDEEP

      12288:okKvYhp1x0cO7t9qmvm0evA7ucbGh7sNqkH5y9CSte3u:okKvi1x0cOj9v5ih7Z79

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks