General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.8584.56.exe

  • Size

    718KB

  • Sample

    240501-qmsv6ahh49

  • MD5

    0f4cb775fe4d9edefe94c69dd6bc75d6

  • SHA1

    40875383fa4734796570f7eeef23a3b23ebe9299

  • SHA256

    2363d23876a13f38f92ae169c04f2d12bb3ab6a027b4f46f144aef5a02ee0105

  • SHA512

    807b3d695a925698bcf7ccea49907cf0680d2b0ab6a02dcaa3d6a7c2a029aeeec0f08b03d6a1177eb56b60fcae72188ff1d3f6caf81dfee8137911e42159e383

  • SSDEEP

    12288:dMosAlMtlk2Wqn1mgWwg98RYu28Uy6rPxmyUHBvRX1A0VfghyPezqcZBmOIS/l:dMluMtlk2PWP6PiywsyMR7i

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.8584.56.exe

    • Size

      718KB

    • MD5

      0f4cb775fe4d9edefe94c69dd6bc75d6

    • SHA1

      40875383fa4734796570f7eeef23a3b23ebe9299

    • SHA256

      2363d23876a13f38f92ae169c04f2d12bb3ab6a027b4f46f144aef5a02ee0105

    • SHA512

      807b3d695a925698bcf7ccea49907cf0680d2b0ab6a02dcaa3d6a7c2a029aeeec0f08b03d6a1177eb56b60fcae72188ff1d3f6caf81dfee8137911e42159e383

    • SSDEEP

      12288:dMosAlMtlk2Wqn1mgWwg98RYu28Uy6rPxmyUHBvRX1A0VfghyPezqcZBmOIS/l:dMluMtlk2PWP6PiywsyMR7i

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks