Unfolding Agent Tesla: The Art of Credentials Harvesting. Browsers Stealing

Osama Ellahi
4 min readFeb 6, 2024

--

Analysis of Agent Tesla, A Close Look at Password Theft Technique

— Part — 2 — Browsers Stealing

The final stage is also developed in dot net (C#) and it is also obfuscated. I tried de4dot but still, the final stage was obfuscated so I continued with the debugging.

In the following figure, you can see all the names are obfuscated.

At first, the xNLwYiY function is a C# method that attempts to terminate all processes with the same name as the current process, excluding itself.

It gets all processes ids and compares with current process id if current running process id does match then it terminates the process. It is doing this so that if it is already running then close it and remove the repetition.

Create an instance of MD5.

The MD5.Create() method is available in the System.Security.Cryptography namespace to create an instance of the MD5 hash algorithm.

The pFLA method attempts to retrieve the serial number of the baseboard using Windows Management Instrumentation (WMI) and returns it; if an exception occurs during the retrieval process, it returns a hardcoded “52b0e816–0a2b-41d9-a0e3–257276619f61” default value.

The 9KASXql5F method retrieves the processor’s ID which in my case is “0FXBFBFFXX090672” using Windows Management Instrumentation (WMI) from the “win32_processor” class and returns it; if an exception occurs during the retrieval process, it returns a hardcoded default value.

The “array” contains the hash value of the UTF-8 encoded string “hk1TqC.

After this it stores 39 browsers and 34 endpoint client’s paths in the list.

|

|

Full Password harvesting blog is shifted to blogging website. Click on following link to see how agent tesla steals browser, we unfold it very deeply.

https://breachnova.com/blog.php?id=30

|

|

|

|

Parts

Part — 1 — Dropper Analysis
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-f1a988cfd137

Part — 2 — Browsers Stealing
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-2d565c68db0d

Part — 3- Discovery & Exfiltration
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-7a77f69435ee

Part — 4 — Stealing FileZilla
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-d30da9c36988

Part — 5 — Stealing The BAT! EMAIL CLIENT
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-c3fe4854775b

Part — 6 — Stealing Outlook Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-de3737f9d66e

Part — 7 — Stealing Trillian Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-afa2dd6e9de7

Part — 8 — Stealing MailBird Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-e5501af1c942

Part — 9 — Stealing WinSCP Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-55e7b2c64d60

Part — 10 — Stealing Core FTP LE Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-cdce40f6a747

Part — 11 — Stealing WinSCP Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-db9bb6698041

Part — 12 — Stealing FTP Navigator Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-59818a3686a3

Part — 13 — Stealing FTP Commander Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-7d01a41d554b

Part — 14 — Stealing FTP Getter Credentials
https://osamaellahi.medium.com/unfolding-agent-tesla-the-art-of-credentials-harvesting-fe5ff29cc93c

--

--

Osama Ellahi
Osama Ellahi

Written by Osama Ellahi

I am cyber security reseacher and I love to meet new people in cyber industry to discuss new ideas. More Blogs : https://breachnova.com

No responses yet