General

  • Target

    Payment Confirmation.tgz

  • Size

    1.4MB

  • Sample

    240909-mn992swcqe

  • MD5

    2bc5967a4572a0769946334c029c493d

  • SHA1

    bd2435f60ffd4fb02e34aced9cd06fc207012768

  • SHA256

    15693cf14766d409168118becf49cbb60cd20b506ffce14b0e509b589a56d232

  • SHA512

    c8b1d74dd84ddd7dac4d2adf30474e7e62a220f063b55131073b8cb7772779bad26b0f6d0f88a7bd0f4a6e33b2207eb4f96b11554231c9cc1e2ef4e51812d35e

  • SSDEEP

    12288:NHgdK9Rt6xOvEWXfW4rLOA0fGq0oV0HEeM/s8gXw/dR92:NAdKIxsfWAL2fvwHEUXXwv92

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/

Targets

    • Target

      Payment Confirmation.exe

    • Size

      810.6MB

    • MD5

      026d2f0bc075aea5b674ee8c8e28c062

    • SHA1

      50be7a17f99f47b288aa507a4f4b8175046af7be

    • SHA256

      dd6792c5b40433f5fa1e59f4e4b5c067c3f0986346904f9c6fe23bc61ca720a2

    • SHA512

      2bc047bc5a32cda240887d8cd19d9aa579e419e268a2678733673e33665fbaa681daaad9e82f4f108702763d4e8eaec03e1f15691d81d1b7add5d3fe0fb01ece

    • SSDEEP

      12288:E5MFKLltmvsXEuXfHgYxJig3Qt5qUu34HE1YQ/e9i72l:VFKOv0fHgYxJigKHE1YQWkE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks