General

  • Target

    5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe_JC.exe

  • Size

    532KB

  • Sample

    230919-td51xaab6s

  • MD5

    7857e7b77ecab84c04dcf49b81e1d095

  • SHA1

    84fd004c945759e63f077cb8d21d2c64c15aa40c

  • SHA256

    5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe

  • SHA512

    81ea194b063a637a16602a740a4e7a70ca295ddac04dcde0cfb3c2e1e7070c1f9696053350778936c15174697f8cd37d4e4d1211a398c4958d33b0be276c3d3b

  • SSDEEP

    6144:MFVbJMcvmZzlUjmcncJVoPgb7UG3XpOHh88AqZagXpJ8QLs1cknClGi2oke3U3tg:MjISkH3M88AqZa+/fkClGi2P3XhRlG

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe_JC.exe

    • Size

      532KB

    • MD5

      7857e7b77ecab84c04dcf49b81e1d095

    • SHA1

      84fd004c945759e63f077cb8d21d2c64c15aa40c

    • SHA256

      5c824a9ae2d89558a4b59db352702f0d8e5349367c578341c9d2a4c224133dbe

    • SHA512

      81ea194b063a637a16602a740a4e7a70ca295ddac04dcde0cfb3c2e1e7070c1f9696053350778936c15174697f8cd37d4e4d1211a398c4958d33b0be276c3d3b

    • SSDEEP

      6144:MFVbJMcvmZzlUjmcncJVoPgb7UG3XpOHh88AqZagXpJ8QLs1cknClGi2oke3U3tg:MjISkH3M88AqZa+/fkClGi2P3XhRlG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks