General

  • Target

    bad.ppam

  • Size

    11KB

  • Sample

    211018-mhjj5sdde6

  • MD5

    a00323d66feb6d05cb3cfc28ff8c79a9

  • SHA1

    50cb3fa623e7a92553512d4b26f797ed23eab0e4

  • SHA256

    4fcca1bce2dd80a24a9def40ab28cc5197e8dd477c2ef77c4d47a19b73fa8bf1

  • SHA512

    1f2a0f55e62511f2e22c53d814e421f9eafc0d019496a2afd59bde15329a0fb0634bfee6117bd0649c745ceae2b288ea9f28b293dc57ea9a99064a7b06406aeb

Malware Config

Targets

    • Target

      bad.ppam

    • Size

      11KB

    • MD5

      a00323d66feb6d05cb3cfc28ff8c79a9

    • SHA1

      50cb3fa623e7a92553512d4b26f797ed23eab0e4

    • SHA256

      4fcca1bce2dd80a24a9def40ab28cc5197e8dd477c2ef77c4d47a19b73fa8bf1

    • SHA512

      1f2a0f55e62511f2e22c53d814e421f9eafc0d019496a2afd59bde15329a0fb0634bfee6117bd0649c745ceae2b288ea9f28b293dc57ea9a99064a7b06406aeb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks