General

  • Target

    Order EQE090.xlsx

  • Size

    343KB

  • Sample

    211018-fnjzjadah4

  • MD5

    1321759f6a6952194d9180c004350d02

  • SHA1

    4c00a9e7c679eb9e80061838b631e5ca42d9b6d1

  • SHA256

    60887ac5c32a7f35bbfaae27d1d9cd79bfdcc667914ad9be3d3b90aaaaf7af5d

  • SHA512

    d5261c815110c9470758c4d7b7a75821824f4f1d3ab97913032470c4936bf98f7227fc5e52948d5b2d4c8eb45540cec75bcc02d6e2e3f1d21dfb162e114e672a

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.saienergy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Sunrising@67

Targets

    • Target

      Order EQE090.xlsx

    • Size

      343KB

    • MD5

      1321759f6a6952194d9180c004350d02

    • SHA1

      4c00a9e7c679eb9e80061838b631e5ca42d9b6d1

    • SHA256

      60887ac5c32a7f35bbfaae27d1d9cd79bfdcc667914ad9be3d3b90aaaaf7af5d

    • SHA512

      d5261c815110c9470758c4d7b7a75821824f4f1d3ab97913032470c4936bf98f7227fc5e52948d5b2d4c8eb45540cec75bcc02d6e2e3f1d21dfb162e114e672a

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks