General

  • Target

    0d9e21d6eb02948a93db81058241523b4fae4829a5103f849dfa3f5a7589a3b3

  • Size

    585KB

  • Sample

    250121-bmjj6ayncr

  • MD5

    592f3bf5174face4924f06826232f5d7

  • SHA1

    41b938aec0ce4dc3c2cd51f4fd6cfb179c6f91e6

  • SHA256

    0d9e21d6eb02948a93db81058241523b4fae4829a5103f849dfa3f5a7589a3b3

  • SHA512

    08108647893d3b329f6687c9cce663abfb209713c684f02becce535946ab1267f6b605fa2b53673346e4864f80b37e493a78100632ebef619f79b3bac4e36964

  • SSDEEP

    12288:IjAoi6GW18uuGL+f+ywDcllmvIeMNg72hjIJoZ/emcZg/nC8pWCXITwY622fPnzo:ILixH3f+ywOWISyFVZcJ8pWCXNx22fPE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO82200287.exe

    • Size

      702KB

    • MD5

      f5d02c1e0fcb07210fa29d619aba3f95

    • SHA1

      be19ce3e4390cbce546a68b117819a883b3e8b3c

    • SHA256

      2ab1f0af5cc8de412943944f3fd714aac575ad57063340031c7743e180c220c7

    • SHA512

      bd11a7d041f3046c0d3d4f73c19e223b1ab8e1c93e6c0cfa294d9e2e4ffe599f519abdbd18233a9b5fa2b8734cdaa60b445d1466e21de9e257dd2fb978e99e3d

    • SSDEEP

      12288:p5X6WhRSUunaOekRi2S4OlVr0pzKecjsUw9Acs8shaIqEoRLh/hK7wd:f6Nn0PFYpeegcvsEIohU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks