General

  • Target

    bank transfer receipt.exe

  • Size

    572KB

  • Sample

    240430-fxkbnadc39

  • MD5

    9920a2d3f35b704f36dcaec0ef04a081

  • SHA1

    dac8eaf636bde656b2a73450fc5ee81e78aaaba3

  • SHA256

    394b16c1302ab448e7c5c81f7ad92c185a13ac68e585b661d2513a69f7d01857

  • SHA512

    f85a5c9abf0484d3cfca6489592d44cf920686c50a454a892068bb2a112cd30501dc470e184e01e27ccd8b3d5bdf995e6a499d7da3d5882ef38f50c58c9d877c

  • SSDEEP

    12288:5p8uKiU/AkH0xEeptvKKNO/P7r9r/+ppppppppppppppppppppppppppppp0G8:5p8R/A9Eeptvu1q8

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      bank transfer receipt.exe

    • Size

      572KB

    • MD5

      9920a2d3f35b704f36dcaec0ef04a081

    • SHA1

      dac8eaf636bde656b2a73450fc5ee81e78aaaba3

    • SHA256

      394b16c1302ab448e7c5c81f7ad92c185a13ac68e585b661d2513a69f7d01857

    • SHA512

      f85a5c9abf0484d3cfca6489592d44cf920686c50a454a892068bb2a112cd30501dc470e184e01e27ccd8b3d5bdf995e6a499d7da3d5882ef38f50c58c9d877c

    • SSDEEP

      12288:5p8uKiU/AkH0xEeptvKKNO/P7r9r/+ppppppppppppppppppppppppppppp0G8:5p8R/A9Eeptvu1q8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks