General

  • Target

    Payment Confirmation.tgz

  • Size

    1.2MB

  • Sample

    240528-hnsmsahh9w

  • MD5

    512531a51eba86d14b665d32a0d20662

  • SHA1

    1dd33a7ff3d6c92be245189152cdf0253240a49a

  • SHA256

    f1dfab54f1c84e55cab037422b7010d131e47e9e456cacc0e9eaabd42f6d559f

  • SHA512

    cf5cadbeb38291e4292566f88fa7994cd1d0864c1bc9807bccbdeaff66cec088ef35e73191791523ea62121eb82727ed13936a04973793b744561a1384b7d9d1

  • SSDEEP

    12288:j9PnLKIX9GelxTYU8PDbKhzku5KbfsbHz+CJ+yyQFNwGiCwvqAAioDV9pDR:RfncecJPuR+yjW3AlDVrR

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6897225989:AAEsj1_ySDFr0QUwWeWQMrpxjobbAY0Fqu8/

Targets

    • Target

      Payment Confirmation.exe

    • Size

      619.9MB

    • MD5

      6fbd7c61b2230f652b299efa2ff2cb95

    • SHA1

      dfec70b5fce9f0a9ac5637b10c02a906a38a643a

    • SHA256

      4dc2e497babe81b247fde341e16f801a77fb20487e8bd3c599840437e2283301

    • SHA512

      463abab92e7380dcc747060f6134f4c01f23bc3acb4bd3a495c01661cd2e29e5502589bd12d79767a99b02da4a4b9e2ac0f7da6201b239d276e0ecd3bbc8dcad

    • SSDEEP

      12288:TKcDV/xXIX9GulFT2vff3Dbmh/gTHR/IzHzmCJAyyQdNwGsQwvwMqZH/2A:Gcuiv339rmxAypWNE2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks