General

  • Target

    fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee

  • Size

    787KB

  • Sample

    240616-bjtkyswhrm

  • MD5

    e5ad7958e87bbe382c5c252222c14664

  • SHA1

    639f3cfa46e5e53e449ce691a49b9f5924e9b0ba

  • SHA256

    fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee

  • SHA512

    13d03c03942781746845faa032fed125c717cbd72843fe4dae63f2cac27e8afaa25cc427bf379cc950d17b5648e12bbd3c98bcd218f14c7fb3f105415fb12170

  • SSDEEP

    12288:ex/2iNPyCK2xrOonIXzEzgAWizmWNKhKDKrx71NWFW7o1a+Y+ROB/z/bNue4k3V:E15yC5Ij/xINKhCKr4CmDY+RK/z/Kk

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee

    • Size

      787KB

    • MD5

      e5ad7958e87bbe382c5c252222c14664

    • SHA1

      639f3cfa46e5e53e449ce691a49b9f5924e9b0ba

    • SHA256

      fd6989c90587630a61d42a4bbe2cd796a8e0eb6c5c15f813c440b00d416863ee

    • SHA512

      13d03c03942781746845faa032fed125c717cbd72843fe4dae63f2cac27e8afaa25cc427bf379cc950d17b5648e12bbd3c98bcd218f14c7fb3f105415fb12170

    • SSDEEP

      12288:ex/2iNPyCK2xrOonIXzEzgAWizmWNKhKDKrx71NWFW7o1a+Y+ROB/z/bNue4k3V:E15yC5Ij/xINKhCKr4CmDY+RK/z/Kk

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks