General

  • Target

    New Order nr. 763ES.xlsx

  • Size

    343KB

  • Sample

    211019-j5626sfde8

  • MD5

    eaca11f07cac788acad6a132e11dc812

  • SHA1

    c2b84d6bef526eea74cf6ff072faab8240a294dd

  • SHA256

    3e49784f4bd41328125657df969f475ce1ee7abc3cbd4d63a4d0d7357e423d10

  • SHA512

    5aee5dde91ba1c887945d4621b0eccf110ff966cf51649200632734d4945d6ee726331900d9caf0aca971bca96d7ce81e3de55f5132d6ad568e6e7d3c0b0cfd1

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.everywhere-gtt.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    chidiebere1994

Targets

    • Target

      New Order nr. 763ES.xlsx

    • Size

      343KB

    • MD5

      eaca11f07cac788acad6a132e11dc812

    • SHA1

      c2b84d6bef526eea74cf6ff072faab8240a294dd

    • SHA256

      3e49784f4bd41328125657df969f475ce1ee7abc3cbd4d63a4d0d7357e423d10

    • SHA512

      5aee5dde91ba1c887945d4621b0eccf110ff966cf51649200632734d4945d6ee726331900d9caf0aca971bca96d7ce81e3de55f5132d6ad568e6e7d3c0b0cfd1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks