General

  • Target

    891408262a391aa3518471825e5bfe85b4fab8ec5385fc7082e5ad50ee67a8f8.exe

  • Size

    430KB

  • Sample

    240523-b4865sha81

  • MD5

    d8b9553db2395d912f1e3976d8c6b73a

  • SHA1

    f5cdbbd8c4691652469b7c64d212adef6d8e59f6

  • SHA256

    891408262a391aa3518471825e5bfe85b4fab8ec5385fc7082e5ad50ee67a8f8

  • SHA512

    4b0158ea63d69cb10034763d7d9745c309b8218d4ffb92d670423a6b04de1fbc360861ff02ca476edb0060183a43ef8a7bb8610b1bbe5dec11344412eb3d86de

  • SSDEEP

    6144:/9X0GEh9EyWfqG2ts8KYV/i43TsgyT4O/f/KNr2WNhfihYiwBN3XMhwpqCHZQpI+:J0VEsvPZG/XUyeOwfchwB+pI+

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      891408262a391aa3518471825e5bfe85b4fab8ec5385fc7082e5ad50ee67a8f8.exe

    • Size

      430KB

    • MD5

      d8b9553db2395d912f1e3976d8c6b73a

    • SHA1

      f5cdbbd8c4691652469b7c64d212adef6d8e59f6

    • SHA256

      891408262a391aa3518471825e5bfe85b4fab8ec5385fc7082e5ad50ee67a8f8

    • SHA512

      4b0158ea63d69cb10034763d7d9745c309b8218d4ffb92d670423a6b04de1fbc360861ff02ca476edb0060183a43ef8a7bb8610b1bbe5dec11344412eb3d86de

    • SSDEEP

      6144:/9X0GEh9EyWfqG2ts8KYV/i43TsgyT4O/f/KNr2WNhfihYiwBN3XMhwpqCHZQpI+:J0VEsvPZG/XUyeOwfchwB+pI+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      34442e1e0c2870341df55e1b7b3cccdc

    • SHA1

      99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    • SHA256

      269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    • SHA512

      4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

    • SSDEEP

      192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4

    Score
    3/10
    • Target

      $PLUGINSDIR/nsExec.dll

    • Size

      6KB

    • MD5

      ac0f93b2dec82e9579bff14c8572a6c8

    • SHA1

      6460244317cbb77e342adb3561ec3acb496c84d5

    • SHA256

      3aa8e0abadefea2de58281198acfe48713a1d5b43aea5619f563cea098e9fd34

    • SHA512

      8055a6af150c45547927499f9cbf645d7f39c8e4f9caff4726fd711d2401abca01a79837095e5752b9f57b06446973ea6506796f2223bdb0179243d6e0575bd2

    • SSDEEP

      96:5OBtEB2flLkatAthPZJoi9jpfW/er6cBbcB/NFyVOHd0+u3wEX:5hB2flXAVJtjf6cBbcB/N8Ved0PJ

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks