General

  • Target

    Balance payment.exe

  • Size

    392KB

  • Sample

    231205-l3cfwsag26

  • MD5

    9380d44800fbdf3899fe1d04af533d1f

  • SHA1

    a052510980763e83d19c3f9824ea58a5f4eab2b3

  • SHA256

    0b6b634a3d763601e989506f485f0bbbb9aa0b739f34d5566069bfd7bdc05904

  • SHA512

    8e2e205984f1672df25d4c78fca631290706e793677f480b0d088e60bdbef6b91b5e7752175cef0d85fc6c381adf39c64cb3ba6c4578ddbd5b7a79dff9f7be99

  • SSDEEP

    6144:WSodkdIGvvJXFj+3vsW5qeP0sCuTiw14LqcCiNMF2eR2BQ1hZnhG5rO/lGFNzTbn:WSFdIGZVjukc044NCiSx71HsKGXJSA

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Balance payment.exe

    • Size

      392KB

    • MD5

      9380d44800fbdf3899fe1d04af533d1f

    • SHA1

      a052510980763e83d19c3f9824ea58a5f4eab2b3

    • SHA256

      0b6b634a3d763601e989506f485f0bbbb9aa0b739f34d5566069bfd7bdc05904

    • SHA512

      8e2e205984f1672df25d4c78fca631290706e793677f480b0d088e60bdbef6b91b5e7752175cef0d85fc6c381adf39c64cb3ba6c4578ddbd5b7a79dff9f7be99

    • SSDEEP

      6144:WSodkdIGvvJXFj+3vsW5qeP0sCuTiw14LqcCiNMF2eR2BQ1hZnhG5rO/lGFNzTbn:WSFdIGZVjukc044NCiSx71HsKGXJSA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks