General

  • Target

    f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885

  • Size

    854KB

  • Sample

    250125-bp5keayjcs

  • MD5

    c583ce216c5a0a982d0aa8ccb8956d5d

  • SHA1

    595f8330a3da759f08fe0b59d5b46aaf54071684

  • SHA256

    f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885

  • SHA512

    4f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79

  • SSDEEP

    12288:6cbLIx2zGRbVk69o340h2x4ZydRXLzT6wpPzOK3q:62fex79ooomNLiwzOK6

Malware Config

Targets

    • Target

      f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885

    • Size

      854KB

    • MD5

      c583ce216c5a0a982d0aa8ccb8956d5d

    • SHA1

      595f8330a3da759f08fe0b59d5b46aaf54071684

    • SHA256

      f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885

    • SHA512

      4f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79

    • SSDEEP

      12288:6cbLIx2zGRbVk69o340h2x4ZydRXLzT6wpPzOK3q:62fex79ooomNLiwzOK6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks