General

  • Target

    1b21f060f7dc8b51ad35605b028f65b6bccb8d84aef03fe334224640d8e91fe2

  • Size

    456KB

  • Sample

    220521-nxsa9secd8

  • MD5

    2df9deb48f3cd0dd9fa396beabd167b0

  • SHA1

    57dc684217ee349e1ddc83574bc2a579f9427a70

  • SHA256

    1b21f060f7dc8b51ad35605b028f65b6bccb8d84aef03fe334224640d8e91fe2

  • SHA512

    b096abb9de6ba3884fec6255232820b0ffa37555d9ef8412861bcf570f4db98f58ac1c5a0bcd33bb9b5607475d210ca00c537293becb0ae2a48fff3541fbfdca

Malware Config

Targets

    • Target

      Receipt_095882247079Dhl.exe

    • Size

      745KB

    • MD5

      6bc2a140c4e6cd0ff72548d0a9f3613a

    • SHA1

      4b15c4122c4f761bb827ad2516c25b69d6d165f1

    • SHA256

      982d2699709d7a024a542a4f771a544cf987ce8d8f15cfa3dcefca157b251e3e

    • SHA512

      eb8e15edf7a7d476e4ee37dd92b304c1073f1081076a1503b0c2e386aa08d252a99832954507a8dc480fdcebfa3cda2b362567be9552ec8678f5a04fe2332c2d

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks