General

  • Target

    444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf

  • Size

    664KB

  • Sample

    240523-b43z5ahc58

  • MD5

    2f8f4c24f72ae76abaf7e2ac2f320b3d

  • SHA1

    0dd76587c9dc2a4165284250cf26f53e10a6ab4a

  • SHA256

    444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf

  • SHA512

    d55807f3a904614e2e6730b7c337e370b92729be51fbb67f2b07065bbfefcbeea6ea1f2bfb3d831f9830ab9d5ffdfa0d59d14d1b3c0cf42f152f840aacbc8057

  • SSDEEP

    12288:53bEupN6sR9/7MSwe/glfG2X5cXDCG4n5fn3tf8iqN6zuC6vaBPGB:dvpNb/7MLYquPzL68iqPCI0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    13539f2504b743dd98521b85373d3634
  • Password:
    trkZiFOREY2q6YnhGZIQbUOlqqfy5naj

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    13539f2504b743dd98521b85373d3634
  • Password:
    trkZiFOREY2q6YnhGZIQbUOlqqfy5naj

Targets

    • Target

      444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf

    • Size

      664KB

    • MD5

      2f8f4c24f72ae76abaf7e2ac2f320b3d

    • SHA1

      0dd76587c9dc2a4165284250cf26f53e10a6ab4a

    • SHA256

      444545470e7680f8dbbb8702aeb6dbe70f12fba4d11855d56dc628e7d6e055bf

    • SHA512

      d55807f3a904614e2e6730b7c337e370b92729be51fbb67f2b07065bbfefcbeea6ea1f2bfb3d831f9830ab9d5ffdfa0d59d14d1b3c0cf42f152f840aacbc8057

    • SSDEEP

      12288:53bEupN6sR9/7MSwe/glfG2X5cXDCG4n5fn3tf8iqN6zuC6vaBPGB:dvpNb/7MLYquPzL68iqPCI0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

2
T1552.001

Credentials in Registry

1
T1552.002

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks