General

  • Target

    c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c

  • Size

    697KB

  • Sample

    240430-bg56zafg57

  • MD5

    ac26d2cbb10147452d05954370444a1b

  • SHA1

    64257dbb911889303be1ed73518fa9525e068428

  • SHA256

    c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c

  • SHA512

    043d49cfe502e5f930d5c6c1b43d2cf07ac1fa97044077373f1cafcbf8623c2cc5fa1a99a022fa00ebefb7bd734cdf38265ac29804e328ef8c797c1318562899

  • SSDEEP

    12288:1+DbgvUB778Qeexx1rNUCDVCLU5uf2tkJCwON8/aUHOYtFsBnTadozPP3JCrhd:UgsBZj9NUHbRJMNfUlkTaSzPP0hd

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c

    • Size

      697KB

    • MD5

      ac26d2cbb10147452d05954370444a1b

    • SHA1

      64257dbb911889303be1ed73518fa9525e068428

    • SHA256

      c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c

    • SHA512

      043d49cfe502e5f930d5c6c1b43d2cf07ac1fa97044077373f1cafcbf8623c2cc5fa1a99a022fa00ebefb7bd734cdf38265ac29804e328ef8c797c1318562899

    • SSDEEP

      12288:1+DbgvUB778Qeexx1rNUCDVCLU5uf2tkJCwON8/aUHOYtFsBnTadozPP3JCrhd:UgsBZj9NUHbRJMNfUlkTaSzPP0hd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks