General

  • Target

    9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b

  • Size

    2.2MB

  • Sample

    240430-bwyensgd53

  • MD5

    4f3c5e74a09c20cb2bd9de3d3db22e7b

  • SHA1

    f971dc104eb76e3e82438e1d1d9b13809538786e

  • SHA256

    9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b

  • SHA512

    f9b13c48705f23836d40e697cd1ae55892b93f5dd05f76654695abd9dcf883620ee87f255b2c405bb05d540e4d8a3571f4de8986f5371ee1c0e5aa096d126f48

  • SSDEEP

    49152:awf540hBL2cdmrA8nSl8bvwxJthIbIN3RKlPEcA8bVNBR/:awW0KcdgSl8bvwxVlN3RuPEcrZ7R/

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b

    • Size

      2.2MB

    • MD5

      4f3c5e74a09c20cb2bd9de3d3db22e7b

    • SHA1

      f971dc104eb76e3e82438e1d1d9b13809538786e

    • SHA256

      9e246638ebd385ca880c0e263f3e406243b897c0162ef2ff2635f1af3756046b

    • SHA512

      f9b13c48705f23836d40e697cd1ae55892b93f5dd05f76654695abd9dcf883620ee87f255b2c405bb05d540e4d8a3571f4de8986f5371ee1c0e5aa096d126f48

    • SSDEEP

      49152:awf540hBL2cdmrA8nSl8bvwxJthIbIN3RKlPEcA8bVNBR/:awW0KcdgSl8bvwxVlN3RuPEcrZ7R/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Tasks