General

  • Target

    c8d8329e36c85fc810f02363121ea1856e2e0dd229220f651c9f86d2bb64e9e0

  • Size

    656KB

  • Sample

    250114-cdlhtswkdl

  • MD5

    4d2edb23dcdae2dc59ba24c1144985a4

  • SHA1

    37552c1162b6884331259b4f55f5d6681b2bae71

  • SHA256

    c8d8329e36c85fc810f02363121ea1856e2e0dd229220f651c9f86d2bb64e9e0

  • SHA512

    96dc220faa8319ea605f57c2a343d9f3cf7baec51816fca2468bd4b49978456de5ac0844bebc781cab4b0a072c501d8c29398d8e14a938763318473fc2ca25af

  • SSDEEP

    12288:hHQ4uTQUYkaRIkUGEQKBsIKCIQ6Wks4yL2gdA6DKtFKi510BabjOSDXrW:I00foK+IKqbL2gdA6unKe0c+SHW

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      1401MES_S Quote.exe

    • Size

      814KB

    • MD5

      2956b5876da3f8bd63627358f39dd5bd

    • SHA1

      c0df48ce532c6b5a7d846f62544d8fb8f1f571f3

    • SHA256

      ae8d1fa58b33e9eddc5fdea9668efb2af4046b6d65d8fc34da8f70953ccd1549

    • SHA512

      6910ebf57121b5c76f27e2e544e548649e9145ceb243fcbd05e8d7692a281755b9c81853b6f24add9e1017a79a9575f4420a4effb2fc06248589a8072bf7f714

    • SSDEEP

      24576:aF8yNK1t4NK1tOqLBxq8l6umA84lWdOGAnkCQ2KfkMLx+:aKhjqR48ddiQ2KfkMLk

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks