General

  • Target

    092b37bf4845038e86a1d8abec9e3c2b.bin

  • Size

    633KB

  • Sample

    240428-bc29hscg4x

  • MD5

    4fc4f3fc02f5277cf2be8891d80aa1d7

  • SHA1

    4ee44822d7b06d0975a13ac206c4c1c72175b6c8

  • SHA256

    9ef6e15de85ecf471b02bd8e21025ef119670194f53e0f3ec47daada3f5c6ee4

  • SHA512

    82d641e2f01dfd1126dabd741475fae86ccf7f09b5e2f8925f4efcf1ac5fea8fc1f04412ffad42067282a88661b6ba233fc3b3239170f8747c74119fcbe1d711

  • SSDEEP

    12288:9m5xITlBrBTy1jUcSEKRD67Csuxt8H6U8kVbKOHxLFikN:9m5xITlBrU1HSEsht8HaiQm

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO#50124.exe

    • Size

      668KB

    • MD5

      b4306234a3b45c69df6a6a7cecd6070c

    • SHA1

      323197c988bc794e3a6314fce81dc20c48d234ee

    • SHA256

      13129eaaaee8200a17214e947f0e984d10050e79c2cd5a963d7ada54ce3aa0a8

    • SHA512

      a30bd4b6365ced8bf53fd6f57c0e30896bdea733305c2c51bd4e63f7c3451a12b64e85cd16c292a02cae6ae2083532ec72ff5151dfed7aa708279aa259cefe16

    • SSDEEP

      12288:cHgnFyHgP/NbIyeSPqBFAbCS2m+2hTMRZuEAFgzknK7N8VJqaW:c+yHs/Nt8BUCmZhTGZuBFKR8V

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks