General

  • Target

    Bank Details (2).zip

  • Size

    590KB

  • Sample

    220926-w9gdjabfh2

  • MD5

    25b8e813a153e5592bcd9ba3abf923d8

  • SHA1

    58ad923a23bd044c127ad913f1ee47f1a8524f8d

  • SHA256

    7a893982142d76760cdfc9d23b3d722cfe86dcf54998fd14936665510b62f90b

  • SHA512

    b3acfa591e4c3859087e686ee1e7063f715bc1b119e9ca970425ee5c983770f0c78b1f4348464ce3141d61417ba9f13e31b26db29d6741d36d62efd9f7b41c74

  • SSDEEP

    12288:/f2TgW7SqZ1FYc/lmjpoyn40eF4tfXXbNRPgPP7q+XO9eNsNW5:/uTzbZmp74itfXphmP7LXOUK4

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hussain-co.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    %%finance_@2018%

Targets

    • Target

      Bank Details (2).exe

    • Size

      886KB

    • MD5

      365b0f736819245a361685067d085973

    • SHA1

      5ebc84d6fee374a581b8be86f4a810cfb0fb78e6

    • SHA256

      cd5fb581a52c0030ee7cb86e500fb6ba669ee4a1266522e70cabf8c02320f948

    • SHA512

      b68047445304c42b24c17f84dd603e7f6b1decd253099e888d18705be7f09bd59d0f70a5ad2885e6ce348a52bc4afe876530620eedb3664081bf70bd751324d1

    • SSDEEP

      12288:2tlylSx18ydcFYcNlmrzeynK0eF4PfXLbNRPgPPUADqjJ5nSZhj41jCHj5b5oaPN:E8AArEzJaiPfXlhoP+jrSx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks