General

  • Target

    30.10.2023 - 02.11.2023 Hesap Ekstresi.exe

  • Size

    617KB

  • Sample

    231103-trcaraee8w

  • MD5

    4649725851eadc797260015dc48b4b24

  • SHA1

    13fa2badaa2927414c9ab7bb14e31c70c6e4bc82

  • SHA256

    7e1956202b29fa1f4b2069bfca66729c92f55a8597f2915713f525d10daee463

  • SHA512

    d27cbff7e23d773579b2a1a7c8aa2d7e77bef2768b8e1b953a6bac43a5a35c0a86948eaa2f2c5fe77d107d348d506ff8e35fbd7156499772871396924c9453b2

  • SSDEEP

    12288:zIk4ZYX+BYDO0obSi1SLrahlHr6WoyN76h4A6yw:zIkZ+Bl0o/10rclH2WoywcD

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      30.10.2023 - 02.11.2023 Hesap Ekstresi.exe

    • Size

      617KB

    • MD5

      4649725851eadc797260015dc48b4b24

    • SHA1

      13fa2badaa2927414c9ab7bb14e31c70c6e4bc82

    • SHA256

      7e1956202b29fa1f4b2069bfca66729c92f55a8597f2915713f525d10daee463

    • SHA512

      d27cbff7e23d773579b2a1a7c8aa2d7e77bef2768b8e1b953a6bac43a5a35c0a86948eaa2f2c5fe77d107d348d506ff8e35fbd7156499772871396924c9453b2

    • SSDEEP

      12288:zIk4ZYX+BYDO0obSi1SLrahlHr6WoyN76h4A6yw:zIkZ+Bl0o/10rclH2WoywcD

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks