General

  • Target

    bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166

  • Size

    856KB

  • Sample

    250112-bes4maxqgw

  • MD5

    347fcf7b8e02b11e2aa163ee64add47d

  • SHA1

    dd13fee38c2b6d4c901b32f950511115e5c97a32

  • SHA256

    bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166

  • SHA512

    b2d161e83e8b6efb3d18ab7cbd9799282f2258be9cd3ecc3d32c07e40ce45975281de09d44a7473503be9453a4624dff93d66fba197c065a2d8fc13859a7eac4

  • SSDEEP

    12288:b1dzNpvxRwPX6beqZH9NZJ70N1u1NGA/Daa4Z6DhwWXdfrZ2qKUFLIxy1GunJRL+:b1dzNVxx1TLp2UFLIuoqM

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166

    • Size

      856KB

    • MD5

      347fcf7b8e02b11e2aa163ee64add47d

    • SHA1

      dd13fee38c2b6d4c901b32f950511115e5c97a32

    • SHA256

      bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166

    • SHA512

      b2d161e83e8b6efb3d18ab7cbd9799282f2258be9cd3ecc3d32c07e40ce45975281de09d44a7473503be9453a4624dff93d66fba197c065a2d8fc13859a7eac4

    • SSDEEP

      12288:b1dzNpvxRwPX6beqZH9NZJ70N1u1NGA/Daa4Z6DhwWXdfrZ2qKUFLIxy1GunJRL+:b1dzNVxx1TLp2UFLIuoqM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks