General

  • Target

    ab5adac9bbd6d03a643246f9e9addc6d687b12852a8844922fbd8798ac1e033b

  • Size

    750KB

  • Sample

    241212-bk75qsvnfw

  • MD5

    c98e78160a9c60bdb654567a1acfcdc7

  • SHA1

    8575553a60364f1aa8760cf4a8aa236b95ca7c21

  • SHA256

    ab5adac9bbd6d03a643246f9e9addc6d687b12852a8844922fbd8798ac1e033b

  • SHA512

    ed7713b070486a2087ee5e3325c426703915db755a23f5f4b5c3fd637503daf5fec4dd12ea9b5d529ae4b433d93ed7b14c851c5a316ca362cf6851fdc2530bcc

  • SSDEEP

    12288:jvThK5P/f3gOcEOkyUOBi9mxJ3vhFOmsNfhDMjv6dunLDI7BBdr2KBUyB4dfjdR9:jvQ5XfslifUr3vhFOBfCOuLErKy4jJnH

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PURCHASE ORDER 300136710.exe

    • Size

      1006KB

    • MD5

      a87229b37b8388f3687aaaa3c132ddf2

    • SHA1

      1390ba7361af77f7d6dbe1b8613faaaec5bc8a47

    • SHA256

      914ca6ae22e3e4d3b6e4fe8442dc7e176037ce54e98dfdec5510a179f4ef3c75

    • SHA512

      ee8ff4c10150a3ea9fe5c2df88f353a7af28e462628602b7fd4e9f4be1e92445d31167ecfee01ae27e1579d800dc4a7b1e8d6dcbcef9944a37db36135096ecf8

    • SSDEEP

      12288:12MKhM39TXsTAi2deLrLGAblJKLAP6ghYZ0zsEoxuj0A7JosuLsitF:0Maci2debGAnnLnzsEoAj0AFotLzF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks