General

  • Target

    a22771da1b634d78656fabc6788d9fda.bin

  • Size

    760KB

  • Sample

    240428-b3vmcsdc77

  • MD5

    c439b544f23a1cfc41bc323f0eb1b697

  • SHA1

    5f2e9ca24acd97b2e1bf7dc372556ec982bb25bb

  • SHA256

    cea0cc8ffc824b546a1d7451135cf391f007f5d8c034c2cfa0ea4cdb81710221

  • SHA512

    06c93ac5347b0c7951c9ff1fe9704a0c0172426ee52014125b19c0bc83c8378e02e4d48ec44f88736636b2af1c922987165b2f25c88e33617d4d5c54fcebb5ab

  • SSDEEP

    12288:Wf6dOUhPaRuCuwOnbyTon9Ns8PBNulBi9NoW9A2fsgxC8L9ms/qJddJhGOuPssYA:WC8UhPaAFb9sblB0NoV2fsYp9msSXZVy

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      BL copy PDF.bat

    • Size

      822KB

    • MD5

      5a12438b3b4c926c12a9376c7bf13426

    • SHA1

      c3185c6a5e5f07a5befbe4af7131d05634f5d1a3

    • SHA256

      1a794211deaa0ecb6abc6101d7c1bd61111b4dd2d895ee7ecf78fbf17f4c9ab3

    • SHA512

      16c1e0e18eb8b3345b8b05443b782cb1dd35492ac986811c39f3cdce8dfe85b003aba029ffca0e38aa33c951d0d08281825152b0e239471eac3de18ac67864d0

    • SSDEEP

      12288:tEqnHvjNIrpf9rN/mc/CaBmIwsyaPSIir97G6NLOZCGKEgbjuPBB5uO12rq:txPjKr5BNDWVxcSIiRG6atlB5N

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks