General

  • Target

    cd6655eae6994bf4dc8037faad921ef7ad7f3eb4cc7110f1e7e53916154dff95

  • Size

    839KB

  • Sample

    231125-dhkyjaga83

  • MD5

    b1d8e0f2bd4320a9a8d17c655f7e2958

  • SHA1

    79bff8ca37702256dede63b3e9531135c205bbe0

  • SHA256

    cd6655eae6994bf4dc8037faad921ef7ad7f3eb4cc7110f1e7e53916154dff95

  • SHA512

    c46357812c12c8632241dedcff870b0bb560ebb273e0b1f7c29616dc31d53fe9c44727f89e189a444da99bc01ba62ff7e31713b70bab4ee7ec55273e9bb42388

  • SSDEEP

    12288:RUwVLsFYMDZbTWFFK333SFuG6Ehe5xabyqG0T39LpTuWUsbq7O9ZOmwpEbsL3iCC:R34B5/33SFuG6Eqgby8N11

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      cd6655eae6994bf4dc8037faad921ef7ad7f3eb4cc7110f1e7e53916154dff95

    • Size

      839KB

    • MD5

      b1d8e0f2bd4320a9a8d17c655f7e2958

    • SHA1

      79bff8ca37702256dede63b3e9531135c205bbe0

    • SHA256

      cd6655eae6994bf4dc8037faad921ef7ad7f3eb4cc7110f1e7e53916154dff95

    • SHA512

      c46357812c12c8632241dedcff870b0bb560ebb273e0b1f7c29616dc31d53fe9c44727f89e189a444da99bc01ba62ff7e31713b70bab4ee7ec55273e9bb42388

    • SSDEEP

      12288:RUwVLsFYMDZbTWFFK333SFuG6Ehe5xabyqG0T39LpTuWUsbq7O9ZOmwpEbsL3iCC:R34B5/33SFuG6Eqgby8N11

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks