Unfolding Agent Tesla: The Art of Credentials Harvesting. Browsers Stealing
Analysis of Agent Tesla, A Close Look at Password Theft Technique
— Part — 2 — Browsers Stealing
The final stage is also developed in dot net (C#) and it is also obfuscated. I tried de4dot but still, the final stage was obfuscated so I continued with the debugging.
In the following figure, you can see all the names are obfuscated.
At first, the xNLwYiY function is a C# method that attempts to terminate all processes with the same name as the current process, excluding itself.
It gets all processes ids and compares with current process id if current running process id does match then it terminates the process. It is doing this so that if it is already running then close it and remove the repetition.
Create an instance of MD5.
The MD5.Create() method is available in the System.Security.Cryptography namespace to create an instance of the MD5 hash algorithm.
The pFLA method attempts to retrieve the serial number of the baseboard using Windows Management Instrumentation (WMI) and returns it; if an exception occurs during the retrieval process, it returns a hardcoded “52b0e816–0a2b-41d9-a0e3–257276619f61” default value.
The 9KASXql5F method retrieves the processor’s ID which in my case is “0FXBFBFFXX090672” using Windows Management Instrumentation (WMI) from the “win32_processor” class and returns it; if an exception occurs during the retrieval process, it returns a hardcoded default value.
The “array” contains the hash value of the UTF-8 encoded string “hk1TqC.”
After this it stores 39 browsers and 34 endpoint client’s paths in the list.
|
|
Full Password harvesting blog is shifted to blogging website. Click on following link to see how agent tesla steals browser, we unfold it very deeply.
https://breachnova.com/blog.php?id=30
|
|
|
|
Parts
Part — 1 — Dropper Analysis
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-f1a988cfd137
Part — 2 — Browsers Stealing
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-2d565c68db0d
Part — 3- Discovery & Exfiltration
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-7a77f69435ee
Part — 4 — Stealing FileZilla
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-d30da9c36988
Part — 5 — Stealing The BAT! EMAIL CLIENT
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-c3fe4854775b
Part — 6 — Stealing Outlook Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-de3737f9d66e
Part — 7 — Stealing Trillian Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-afa2dd6e9de7
Part — 8 — Stealing MailBird Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-e5501af1c942
Part — 9 — Stealing WinSCP Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-55e7b2c64d60
Part — 10 — Stealing Core FTP LE Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-cdce40f6a747
Part — 11 — Stealing WinSCP Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-db9bb6698041
Part — 12 — Stealing FTP Navigator Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-59818a3686a3
Part — 13 — Stealing FTP Commander Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-7d01a41d554b
Part — 14 — Stealing FTP Getter Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-fe5ff29cc93c