General

  • Target

    064632b969185ca5518a8799981a105b.bin

  • Size

    521KB

  • Sample

    230701-bcxn2afb83

  • MD5

    7116ef2fa16a62e7143109959b5a55e9

  • SHA1

    452fee9671f0e13860584f3a27296d5c93139c4d

  • SHA256

    9cfee0c89c422e7d3e1b29f5a591605d5e1ca72dfe35c97c2beaf72875190a2f

  • SHA512

    b344a2aa95d2d8fe26afa3cc2c766b160a3af10115e7c884de093bb8475e8fe0f1f1ee258b9756f9052df36531373a7c84dce8279f46034da9e0bbc3d05c9129

  • SSDEEP

    12288:NU5MbOMIcYeYoFpcsPv6TJU78KLZlG/QQE+hs:NUKbLSeL/dPvOKLi/hy

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      RICHIESTA D'OFFERTA A EDILGRAPPA SRL_PDF.exe

    • Size

      672KB

    • MD5

      04d4f55b839a1d2f2335220f37de7686

    • SHA1

      4f463e70cc5d382e8eb9662ca748447811ad3153

    • SHA256

      8fa741885aa3008210667909c5dc93bbd695bfa9f10b808f329e70a87dbbc262

    • SHA512

      ac2dc219a0e509a2c2a9dc0f24313bec4d16ab4970bfc724b4f095e0221316c3388aa698c345217510f45e98184f8feed4b48809284b22953c2d4a87e17aa0f8

    • SSDEEP

      12288:W9XncUB8m9VZ2oVHoomvEbJhGYVmxI0/l5UX5yaz15/OO:u8GxQvEvVmxI0/Py5yaz1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks