General

  • Target

    b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe

  • Size

    359KB

  • Sample

    240705-b5rcqasajg

  • MD5

    ab0e0ab3d5709e3831dcaa08b6c8a9db

  • SHA1

    5d8e5e35fe9edd166b13e592fafe08a74b14455c

  • SHA256

    b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1

  • SHA512

    afde3acf5bb8a6be06c182d53daa437ce92a92871f6953b6766fbf51da08cb2f3581c04db1ffc2542cd8d4dcaf4f8cc1c8b732e3027d29c94a39d42b1418a327

  • SSDEEP

    6144:hHadpdwMakhnB4kzYT6BwH50mM44oeRa6I/XP+fYi8QE+qDVDAIBE+1W4Fh95up:hHadykhipH50r4ll/XelURl/z95K

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe

    • Size

      359KB

    • MD5

      ab0e0ab3d5709e3831dcaa08b6c8a9db

    • SHA1

      5d8e5e35fe9edd166b13e592fafe08a74b14455c

    • SHA256

      b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1

    • SHA512

      afde3acf5bb8a6be06c182d53daa437ce92a92871f6953b6766fbf51da08cb2f3581c04db1ffc2542cd8d4dcaf4f8cc1c8b732e3027d29c94a39d42b1418a327

    • SSDEEP

      6144:hHadpdwMakhnB4kzYT6BwH50mM44oeRa6I/XP+fYi8QE+qDVDAIBE+1W4Fh95up:hHadykhipH50r4ll/XelURl/z95K

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      192639861e3dc2dc5c08bb8f8c7260d5

    • SHA1

      58d30e460609e22fa0098bc27d928b689ef9af78

    • SHA256

      23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    • SHA512

      6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

    • SSDEEP

      192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr

    Score
    3/10

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Tasks