General

  • Target

    8264a089a3600c557bbdc8e0a3e35dbb8b8fae37e4f430faf795bb3a4115ca02

  • Size

    317KB

  • Sample

    240426-bskpeagh95

  • MD5

    d8e148605f430bdfc7a4ce2635a1b886

  • SHA1

    f678da501df28713fbecc6c54be2681169acffbd

  • SHA256

    8264a089a3600c557bbdc8e0a3e35dbb8b8fae37e4f430faf795bb3a4115ca02

  • SHA512

    e42e343b9d4330b778e2615314cd6a752040dfab2f190b1cbd84f8881c9faebc756a5d66cd9bb98249130b5147f0b22e3e06e8a29b17f648fa76e21f8e0ef4fe

  • SSDEEP

    6144:6WunJ/qQY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVwdMIG+e1Lj4c82rIGYW:6HJ/qN3bVwdMIG+e1Ac82W6+

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8264a089a3600c557bbdc8e0a3e35dbb8b8fae37e4f430faf795bb3a4115ca02

    • Size

      317KB

    • MD5

      d8e148605f430bdfc7a4ce2635a1b886

    • SHA1

      f678da501df28713fbecc6c54be2681169acffbd

    • SHA256

      8264a089a3600c557bbdc8e0a3e35dbb8b8fae37e4f430faf795bb3a4115ca02

    • SHA512

      e42e343b9d4330b778e2615314cd6a752040dfab2f190b1cbd84f8881c9faebc756a5d66cd9bb98249130b5147f0b22e3e06e8a29b17f648fa76e21f8e0ef4fe

    • SSDEEP

      6144:6WunJ/qQY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVwdMIG+e1Lj4c82rIGYW:6HJ/qN3bVwdMIG+e1Ac82W6+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks