General

  • Target

    KT-704-3403.xls

  • Size

    35KB

  • Sample

    211025-2svsgshefr

  • MD5

    231cec4f63028cdcdac30caa196d45b0

  • SHA1

    40e0a297b92c7ed3451f0e2aec37edb06018bf55

  • SHA256

    d685747fcfcdf80f50b8611fa8f6d992a0d702330a117cb137d8cce80594e696

  • SHA512

    498336bb5ff0c6465110e1286e787a1828697d4b34a9a1747ddb5f92b674297f8e7c803756030150f3b31410048137f2c98036b3d3b83d7d5765d7b537130f12

Malware Config

Targets

    • Target

      KT-704-3403.xls

    • Size

      35KB

    • MD5

      231cec4f63028cdcdac30caa196d45b0

    • SHA1

      40e0a297b92c7ed3451f0e2aec37edb06018bf55

    • SHA256

      d685747fcfcdf80f50b8611fa8f6d992a0d702330a117cb137d8cce80594e696

    • SHA512

      498336bb5ff0c6465110e1286e787a1828697d4b34a9a1747ddb5f92b674297f8e7c803756030150f3b31410048137f2c98036b3d3b83d7d5765d7b537130f12

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks