General

  • Target

    28e8f4098b5d13326674b51aab58d055.bin

  • Size

    780KB

  • Sample

    240430-bgr94sfg36

  • MD5

    bfc6004a5411ba5d8288821826c1936e

  • SHA1

    98f30233a4f8ecb59ec535d21262bb17c8979ec8

  • SHA256

    46569b3272e041927992993c37881be9d694ab74d2a949500e82402355ffcb81

  • SHA512

    28abc84a6fa05e7b4f48d559cde5a68a3e725a56c764bca986fc3acd431cca240d92da5fab3c5bb2a0a7c6a34b27074dff30457da778ffeff611f27067b056ad

  • SSDEEP

    12288:/oUHUWNWQ9C2TDDmGI3GkzUEgYeYWiFht84uRusfMgITufqWZV6eaK2ZElsngpPp:/oU82L9F32WiFht9uAb+aK23gpR

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      d5bc04d04a04dc446c372f8f793f18c0cb8d45ba1ae5a817f4314a177fc8d7cc.exe

    • Size

      836KB

    • MD5

      28e8f4098b5d13326674b51aab58d055

    • SHA1

      6635fa0024bfebfe5bd67e3c0cce5452e3c9b684

    • SHA256

      d5bc04d04a04dc446c372f8f793f18c0cb8d45ba1ae5a817f4314a177fc8d7cc

    • SHA512

      41669163544ed0e5164b1af023b3a2e7c16f32e5e5e6ee68b252dae172c3e574eda8e082ceab5709a63ba279063b904ba8f3fc519fd247ccb4253db3cf7ffb36

    • SSDEEP

      12288:CZqnHvjNIrpf9rN/mc/CFvzstbLM2XS3uxsM6AgKH2e3ZFzJnbP93xE6DlI50Xze:C0PjKr5BNDHbzDx3VgYJjh2OlLze

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks