General

  • Target

    SecuriteInfo.com.Trojan.Siggen9.56003.3620.25919

  • Size

    944KB

  • Sample

    200701-nn1kq5elb6

  • MD5

    e0cf678550eabb02e1a3ffc9279584b3

  • SHA1

    5fea2ada1c7ae9ed64a75da0e7d9792e038a89c7

  • SHA256

    dcd8e02505929d4ef4a4cf57338688a12d0f012a6f4258cbe1999386172add07

  • SHA512

    121bc979804f5e1135d0dc744bbcc9c7a30c0ac31c5b15bbf662c9122cf3653e6dc5f3cdd5548553a741be9c24447b3a9c279e2ba3cad91972ea79fc15492656

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.Siggen9.56003.3620.25919

    • Size

      944KB

    • MD5

      e0cf678550eabb02e1a3ffc9279584b3

    • SHA1

      5fea2ada1c7ae9ed64a75da0e7d9792e038a89c7

    • SHA256

      dcd8e02505929d4ef4a4cf57338688a12d0f012a6f4258cbe1999386172add07

    • SHA512

      121bc979804f5e1135d0dc744bbcc9c7a30c0ac31c5b15bbf662c9122cf3653e6dc5f3cdd5548553a741be9c24447b3a9c279e2ba3cad91972ea79fc15492656

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks