General

  • Target

    M0120211002081457786750.ppam

  • Size

    11KB

  • Sample

    211018-lhmq5adcg5

  • MD5

    6dcc9d21ef2edc9fd781ff822bd084d9

  • SHA1

    6f06878c124458c4c470c271f403a996cc695bf1

  • SHA256

    33f4029423a3f52c376e6335e41d1ac4fccc9eff56aa29942cda968def3834c4

  • SHA512

    61a30c98be6af40ce7cc606ce0a864a1e3fece6cdd10f25af6e2bceebd3b240f4b73d22e9e9b0d27d1872747831ebeca97aa0dd1c4ffa3f9181ed0fdceb2c615

Malware Config

Targets

    • Target

      M0120211002081457786750.ppam

    • Size

      11KB

    • MD5

      6dcc9d21ef2edc9fd781ff822bd084d9

    • SHA1

      6f06878c124458c4c470c271f403a996cc695bf1

    • SHA256

      33f4029423a3f52c376e6335e41d1ac4fccc9eff56aa29942cda968def3834c4

    • SHA512

      61a30c98be6af40ce7cc606ce0a864a1e3fece6cdd10f25af6e2bceebd3b240f4b73d22e9e9b0d27d1872747831ebeca97aa0dd1c4ffa3f9181ed0fdceb2c615

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks