General

  • Target

    d6aa040bdb9225a169d8b6efb39e48b5ef16a4e2f2334b2f80c215c603331eee

  • Size

    707KB

  • Sample

    240425-dllz1aeb86

  • MD5

    5f2b165fb7d86e68285cb69130d446e4

  • SHA1

    137d74a66bb6caf9c363b235cac85fcc14d027fb

  • SHA256

    d6aa040bdb9225a169d8b6efb39e48b5ef16a4e2f2334b2f80c215c603331eee

  • SHA512

    045fa8f01cda67b48f5cd9d50dfe7269b6d4c18e630a6246a1866fac485ed7ef7aec9e3193f3da6b43ecc3b36416df52d4a3ebf149214742104a940bd2e70049

  • SSDEEP

    12288:XNgLeFR6aglv312Z3yR4ISPfTsoFOhB1YclFbwlg5OPciwaYhJa/IU52WkSD+PRH:rgJ312ZzHWhPYcllwW5qcJ2wU5gSi5r7

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      d6aa040bdb9225a169d8b6efb39e48b5ef16a4e2f2334b2f80c215c603331eee

    • Size

      707KB

    • MD5

      5f2b165fb7d86e68285cb69130d446e4

    • SHA1

      137d74a66bb6caf9c363b235cac85fcc14d027fb

    • SHA256

      d6aa040bdb9225a169d8b6efb39e48b5ef16a4e2f2334b2f80c215c603331eee

    • SHA512

      045fa8f01cda67b48f5cd9d50dfe7269b6d4c18e630a6246a1866fac485ed7ef7aec9e3193f3da6b43ecc3b36416df52d4a3ebf149214742104a940bd2e70049

    • SSDEEP

      12288:XNgLeFR6aglv312Z3yR4ISPfTsoFOhB1YclFbwlg5OPciwaYhJa/IU52WkSD+PRH:rgJ312ZzHWhPYcllwW5qcJ2wU5gSi5r7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks