TROJAN AGENT TESLA – MALWARE ANALYSIS
Hash – 077f75ef7fdb1663e70c33e20d8d7c4383fa13fd95517fab8023fce526bf3a25
Family : Agent Tesla
Signature: Microsoft Visual C# v7.0/ Basic.NET
Filename: UIhLdVHHlUAKoEOpjVAsXFlIQrgS.exe
![Blg9_30032020_81](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_81.png?w=860)
VirusTotal score:
![Blg9_30032020_82](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_82.png?w=860)
Malware behavior:
- Steal browser information (URL, Usernames, Passwords)
- Steal passwords for email clients.
- Steal FTP Clients
- Steal download manager passwords.
- Collect OS and hardware information.
Browser Information:
When I debug the malware executable, Initially it creates a SQLite database to store collected information from victims machine.
Below are the tables getting created.
![Blg9_30032020_26](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_26.png?w=860)
![Blg9_30032020_83](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_83.png?w=860)
![Blg9_30032020_28](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_28.png?w=860)
Tables created:
- meta
- logins
- sqlite_sequence
- stats
- compromised_credentials
found it collected browsers data (Google chrome), that includes accessed URLs and related usernames and passwords.
![Blg9_30032020_29](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_29.png?w=860)
database table logins stores all browser related information. Below are the table columns.
![Blg9_30032020_30](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_30.png?w=860)
![Blg9_30032020_47](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_47.png?w=860)
Apart from this, malware also look for all different types of browsers to steal data from it.
It look for below browsers:
- Opera Browser
- Yandex Browser
- 360 Browser
- Iridium Browser
- Comodo Dragon
- Cool Novo
- Chromium
- Torch Browser
- 7Star
- Amigo
- Brave
- CentBrowser
- Chedot
- Coccoc
- Elements Browser
- Epic Privacy
- Kometa
- Orbitum
- Sputnik
- Uran
- Vivaldi
- Citrio
- Liebao Browser
- Sleipnir 6
- QIP Surf
- Coowon
![Blg9_30032020_11](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_11.png?w=860)
Below screenshot taken while debugging malware.
![Blg9_30032020_50](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_50.png?w=860)
Malware also look for below email clients. I haven’t install any of them on my machine during analyzing this.
Email Clients:
- Outlook
- Thunderbird
- Foxmail
- Opera Mail
- Pocomail
- Claws-mail
- Postbox
![Blg9_30032020_12](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_12.png?w=860)
![Blg9_30032020_84](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_84.png?w=860)
FTP Clients:
Malware grabs credentials from FTP clients as well. Below list.
- FileZilla
- Core FTP
- SmartFTP
- FTPGetter
- FlashFXP
![Blg9_30032020_76](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_76.png?w=860)
![Blg9_30032020_75](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_75.png?w=860)
It also makes FTP web request. (Remote Server couldn’t find)
![Blg9_30032020_90](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_90.png?w=860)
![Blg9_30032020_91](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_91.png?w=860)
It uses smtp client to send information over the network using port 587 which indicates sending data from smtp client to a particular smtp Server through mail attachments.
![Blg9_30032020_85](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_85.png?w=860)
![Blg9_30032020_86](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_86.png?w=860)
Malware executable also make HTTPWebRequest which must be downloading SMTP client to transfer data to remote SMTP server.
![Blg9_30032020_89](https://malwrhunter.files.wordpress.com/2020/04/blg9_30032020_89-1.png?w=860)
unfortunately, it didn’t make any connection to any remote server address.
Summary:
- Steal Browser Information including urls, usernames and passwords.
- Steal email client credentials.
- Steal credentials of FTP servers.
- Computer information.
well done :-)
RépondreSupprimer