General

  • Target

    eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6

  • Size

    893KB

  • Sample

    240616-bp4ccatbpf

  • MD5

    520de8b9a99e8f8d29e983910ce4dac2

  • SHA1

    4818b508a298814e98698bb504bc26bf69bf4976

  • SHA256

    eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6

  • SHA512

    aae54cd7729fee05c1aa2bd7610c641c8cc6336c8b8abf8e9e210af5561ce702c43eb3e815f8b0451e62387c3b7466cad30bf4ae225654973fa4def04a40264e

  • SSDEEP

    24576:6OFg1l771DIjJ69sQnv+yBQtjuzR8ug+5:xFg1lhk49Hvv2juzR

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6

    • Size

      893KB

    • MD5

      520de8b9a99e8f8d29e983910ce4dac2

    • SHA1

      4818b508a298814e98698bb504bc26bf69bf4976

    • SHA256

      eec0ae35358884d0570ac828cf3c6b1bb437335503b93c413042ef7f2f480ee6

    • SHA512

      aae54cd7729fee05c1aa2bd7610c641c8cc6336c8b8abf8e9e210af5561ce702c43eb3e815f8b0451e62387c3b7466cad30bf4ae225654973fa4def04a40264e

    • SSDEEP

      24576:6OFg1l771DIjJ69sQnv+yBQtjuzR8ug+5:xFg1lhk49Hvv2juzR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks