General

  • Target

    9ac9b06776fc23988d64dc77fcc73aa742750a9538546ef976f084c1c9d1a333

  • Size

    854KB

  • Sample

    240630-bhrpza1drd

  • MD5

    3b26db0dd5d0a4d1fee567aafe927f82

  • SHA1

    19a1b658afc8c1cb04de677cc727508c157cdcda

  • SHA256

    9ac9b06776fc23988d64dc77fcc73aa742750a9538546ef976f084c1c9d1a333

  • SHA512

    0eb82f5e50920e9aa7c5a00bdbcfd1094756591bf3cc9574105cc544a2ab7ce46e62594630fe62749c5e6f77d720a542dcd99c6da128ce93dac188cd42bca968

  • SSDEEP

    12288:4I94SIG0d0uFhCchHcEiem+PuPeILLgJ9AI8s16fdeD7hV4wzd9CZ1k3:QzfVu25BtmPeIHgJ95w2F2et

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      9ac9b06776fc23988d64dc77fcc73aa742750a9538546ef976f084c1c9d1a333

    • Size

      854KB

    • MD5

      3b26db0dd5d0a4d1fee567aafe927f82

    • SHA1

      19a1b658afc8c1cb04de677cc727508c157cdcda

    • SHA256

      9ac9b06776fc23988d64dc77fcc73aa742750a9538546ef976f084c1c9d1a333

    • SHA512

      0eb82f5e50920e9aa7c5a00bdbcfd1094756591bf3cc9574105cc544a2ab7ce46e62594630fe62749c5e6f77d720a542dcd99c6da128ce93dac188cd42bca968

    • SSDEEP

      12288:4I94SIG0d0uFhCchHcEiem+PuPeILLgJ9AI8s16fdeD7hV4wzd9CZ1k3:QzfVu25BtmPeIHgJ95w2F2et

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks