General

  • Target

    9a87300066edcd42c6a53f1af9f04aa5.bin

  • Size

    255KB

  • Sample

    240417-b2p1gsab54

  • MD5

    2c42f88739f9c5ced6d0b7acf37999e9

  • SHA1

    217df753f322193cc6db227d4c0514af36085444

  • SHA256

    99611329713109741b7f65d25c16155a9f8cdb368d9c9465e9262aac97745a2d

  • SHA512

    6af6b2a11dda2799cff8421e2db397cb3c89dec606eff46f7fcb75da38cdf4a3dcb3689111a95fe7ef0a3f1b9df89d663d04375956ea7ff41a0c45c0f2f77f10

  • SSDEEP

    6144:ZobYNxgmtDVCwmD9V8wb56Ip9bjYfFlVoFBkvatp/ryW1k2VY:qbYNxTy4wbPXbsfFlVonp/eW1k26

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      b221fbbba9145479c60a63b77da5c52785a2f11ae697a6eb7224f930bbda9cdf.exe

    • Size

      345KB

    • MD5

      9a87300066edcd42c6a53f1af9f04aa5

    • SHA1

      2b1a96c79151bc1e9d8e5d87fab6c84d55b74ac1

    • SHA256

      b221fbbba9145479c60a63b77da5c52785a2f11ae697a6eb7224f930bbda9cdf

    • SHA512

      688971463b3db014a01d9da8cc656968b8c7a4933cd1f17671180ee1e28ee612ee27a4021bcbf7678cdab159c0988ec859e2df6f4ae7075b57e3cc7b8b5ffbfa

    • SSDEEP

      6144:bRSEAhZalpfBcl7UqXJSbs+6ucHac1jACZ/rYcPdqbmodhATW7qrMv17eysNc:NSnHpSqXJn+6ucL1nrYc1qKu4W7qgv9C

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks