General

  • Target

    55803a4227e0110d88300cd0ea5c98d479738a2a33be1d07702301eb1fc37527.exe

  • Size

    542KB

  • Sample

    240523-rknn4adh4x

  • MD5

    a5b21b2b487ef822fa7564a5a6833e10

  • SHA1

    658b3e8680f568b6ae557bbc14cefbf8ce6cc54d

  • SHA256

    55803a4227e0110d88300cd0ea5c98d479738a2a33be1d07702301eb1fc37527

  • SHA512

    8f3bde613d093b50277a60accfea4adf8e7c5eaccc9bfbe2684e6271ed20e6e3ebe38c9ce20b9f820a628b0deb48a3f0c4f9907af42dcd540ab6ae5c8ae804a6

  • SSDEEP

    12288:reCLyNx2qdIzjxxtoHzWb+xDuKLDKg4rUQqS0JFy/ykYPEvGT+KsjE:rebNwqaz9jszK+xiKvt4rUM0JFyFYPg8

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      55803a4227e0110d88300cd0ea5c98d479738a2a33be1d07702301eb1fc37527.exe

    • Size

      542KB

    • MD5

      a5b21b2b487ef822fa7564a5a6833e10

    • SHA1

      658b3e8680f568b6ae557bbc14cefbf8ce6cc54d

    • SHA256

      55803a4227e0110d88300cd0ea5c98d479738a2a33be1d07702301eb1fc37527

    • SHA512

      8f3bde613d093b50277a60accfea4adf8e7c5eaccc9bfbe2684e6271ed20e6e3ebe38c9ce20b9f820a628b0deb48a3f0c4f9907af42dcd540ab6ae5c8ae804a6

    • SSDEEP

      12288:reCLyNx2qdIzjxxtoHzWb+xDuKLDKg4rUQqS0JFy/ykYPEvGT+KsjE:rebNwqaz9jszK+xiKvt4rUM0JFyFYPg8

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      8b3830b9dbf87f84ddd3b26645fed3a0

    • SHA1

      223bef1f19e644a610a0877d01eadc9e28299509

    • SHA256

      f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    • SHA512

      d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

    • SSDEEP

      192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks