General

  • Target

    80febe2173bea0e30264594d5234d1dd15e19160efcbd747a255dc2f00dcf40e

  • Size

    667KB

  • Sample

    241016-bqqgwazcmn

  • MD5

    75de05e477e1165f38cafc195187fdd6

  • SHA1

    bebc26db5edb4cbd37f9473495dd4e0af5c0a781

  • SHA256

    80febe2173bea0e30264594d5234d1dd15e19160efcbd747a255dc2f00dcf40e

  • SHA512

    e5503c88febb8b52b4b79b2b817a268dfa74c21d574c61767b0c24cb0c2322654efec7db706478eba369aa8a55791674c2c53129e1dfa2e5a0f8dae4a33dfa02

  • SSDEEP

    12288:Jm9g27ZJgJF/Y5qWpJvMJDM/Yf6efEQuMpA6vbJOQvNCWBjCBImh:SV7ZJgJFTWLvEuchfEQfvZwWBjWj

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Request for Quote GE63138XM32.exe

    • Size

      834KB

    • MD5

      102cd04929ffa73b9584a7c6953a8ca5

    • SHA1

      6f7943b1901c44c28bc16483b4187bc8f15f5742

    • SHA256

      3890bc2638beaf831fb3ad49af5442ef5118d70a6d7c25a3fb0b05e47d9e75e6

    • SHA512

      ba7c17f3ddf61bf2a8ba7d2912b2a3b2737616bad21accfa84db8b958ab33a0b3b197a6326c240e8bbc23dfe8f0868bb68a19a20141e50ca9d9da258442e3694

    • SSDEEP

      12288:DeUSST7V67gJFlY5qWHJv/h42L7ukEYIbMpY6vbDOQv/Zlav7klgrdm4Vz0Rppp5:DcM7Y7gJFZWpvq2L7ukEYIWvPT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks