General

  • Target

    9179d3307d1866cf6cf5298f794b27b6.bin

  • Size

    655KB

  • Sample

    230612-cjk49aae33

  • MD5

    4a48e59b562dac6a4ea2f639562cc4bf

  • SHA1

    ec178a781b7f4eb1b60fc0a31bfe040d347e9ed1

  • SHA256

    78ca939a675abcc368871c8d4ac8182e124408538df90e924f8dda21f6e9ec0f

  • SHA512

    cdaa952d9d5ecaf36dbee79b09f59c32a692684b14d404160a479f69c4887b001a892f499fb00b4d658e4748893425a3547df43895b833d07b81b9e5977b2389

  • SSDEEP

    12288:C2F1W2F2NT/cJaEjweLXOCvxv9yWa72e7C5hXjQkQxdD6h/lDLE7wtFxj:C6tUT/GjwVCvFoJyQ9x56JZt

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      683532549c9b7349442f5dc3466cacc398bb663564eb63f77a2964dd216dce16.exe

    • Size

      757KB

    • MD5

      9179d3307d1866cf6cf5298f794b27b6

    • SHA1

      ad1009cdc2ba7ea7c825bb3d9f734b8ce3a7af49

    • SHA256

      683532549c9b7349442f5dc3466cacc398bb663564eb63f77a2964dd216dce16

    • SHA512

      83edec2e8dc0e0db6b0df8078806d2863b12d7f7c5058faa771c70e7aede591390c32eeee15679915d63a400a9eea9df7574905f1a81b94c16decc2397589262

    • SSDEEP

      12288:RG4haDnLMzIL2q+RTdOL8mG8pTWQ68IfJzOXGzqVcVcrxaGw2xfYi2Zv5:BOyqGUL8mZTWQ4f9VzqVcml9Cv5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks