General

  • Target

    MalwareBazaar.1

  • Size

    702KB

  • Sample

    240722-p95ykaybqe

  • MD5

    69fd5caa42fbfee9f8dbabe72a2a619a

  • SHA1

    b7c6b1af310560a61b30f617c79fcff70783c773

  • SHA256

    104ab77fb1ca4088384acacaa40b79f8ed7fafcaac9a2730eaebb27fc3592f7f

  • SHA512

    f79db478e01464f85b5fc6d31614574851168ffe6a5adeffd53b48233ca1ddee0ed76cdf22d3747bd696b05e4705cad1ea812f1166b3c956f469a6933152c5cb

  • SSDEEP

    12288:SKuAEx2MXm9MJSqf9/d0FuoGOoCADobqLl0hwcXd82b052od0qaGtTnLLGObke1E:gxFXm9MJhFWADM4lcwcXm2beHd0RMLLk

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      New Order.exe

    • Size

      846KB

    • MD5

      bb8622ac441390650d12a874a4a10de2

    • SHA1

      e530bdcc5854cc919762d5bcb2b97c18f3567a1c

    • SHA256

      7fce3e76c6fced8598769e97c7cf34eaa6e86949bf61b75526fb3b489f6d81f7

    • SHA512

      c39acb21430929e14d21df11042837189e7c6e092735c4091e16339f030d652b3aa577e34cc85563233503b5b15982ff98e54e05547bffae6ef80586c76f5303

    • SSDEEP

      12288:zZxOh/wyO3wLcujxhjCNJFXS9TVWEZNxbvshQBaVZfaMzuX0J:zZCF9LcGfj8FiRPNxb0hQ6laYuX0J

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks