General

  • Target

    BratneyCompaniesPO-5313SCXC-097.xlsm

  • Size

    139KB

  • Sample

    200716-s5mxdbdjgn

  • MD5

    49a24e9873f40ce4424c9f324660874f

  • SHA1

    c833cc3c580e565ab3e831fba24351c5e5d59293

  • SHA256

    b498465b42c81550c8e6e6afe13029fe4a552d54b2134425d6b521a4190eb9ab

  • SHA512

    b339439dd4e2fc21b5b401a673d6caed20fb504b49a81cd0697453ddd7e76f0f400f91f29459cfead07e087922cbf65686a6745320baf5b0faf9314c22bab0fb

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hsdowsggpla.com/ThurEvent.exe

Targets

    • Target

      BratneyCompaniesPO-5313SCXC-097.xlsm

    • Size

      139KB

    • MD5

      49a24e9873f40ce4424c9f324660874f

    • SHA1

      c833cc3c580e565ab3e831fba24351c5e5d59293

    • SHA256

      b498465b42c81550c8e6e6afe13029fe4a552d54b2134425d6b521a4190eb9ab

    • SHA512

      b339439dd4e2fc21b5b401a673d6caed20fb504b49a81cd0697453ddd7e76f0f400f91f29459cfead07e087922cbf65686a6745320baf5b0faf9314c22bab0fb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks