General

  • Target

    Transferencia.exe

  • Size

    624KB

  • Sample

    230719-j548ksac5x

  • MD5

    6c69b1778096564e9926f9cab8600031

  • SHA1

    39592861740092bbfe0bcb632b0bc55fbde58ab1

  • SHA256

    850ce005298ab95b563a50c0b95618d97bc4696e3fffddf12b06c25bf933bfb0

  • SHA512

    ad501fd2ccf52740dc0c64bef085551f840f926b2f721923016ad0021420d541de2ec4f2298a1ef99715834aa13bf55717c3849f1c48f6da156d95e8c90ff5e4

  • SSDEEP

    12288:hPYPfY7fsbKjfK9yK2kVM7Ta/UO42LMW2lNDCxNZP:hPYPgwbKjGyK2j6UqMWENDk

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Transferencia.exe

    • Size

      624KB

    • MD5

      6c69b1778096564e9926f9cab8600031

    • SHA1

      39592861740092bbfe0bcb632b0bc55fbde58ab1

    • SHA256

      850ce005298ab95b563a50c0b95618d97bc4696e3fffddf12b06c25bf933bfb0

    • SHA512

      ad501fd2ccf52740dc0c64bef085551f840f926b2f721923016ad0021420d541de2ec4f2298a1ef99715834aa13bf55717c3849f1c48f6da156d95e8c90ff5e4

    • SSDEEP

      12288:hPYPfY7fsbKjfK9yK2kVM7Ta/UO42LMW2lNDCxNZP:hPYPgwbKjGyK2j6UqMWENDk

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks