General

  • Target

    invoice.rar

  • Size

    570KB

  • Sample

    221003-qex5xaggbr

  • MD5

    55167cdf6f9a8820f323ffe8707a62fe

  • SHA1

    6535c758134dc5c503479dd855e6a3a720d74f1f

  • SHA256

    2856c52222de6d572f627ef9b98f0b20424c7979e6310ab6d02eb2cc9efb310b

  • SHA512

    80ba17541ed577f9340e06a2ea1320ddc3273c7457d8bde4c5ed3398c8bc5ce7e0af3cd115ae6d141241052d99414f28d71ae08ea790e018fb6ccb0a07a556e7

  • SSDEEP

    12288:bp3tC93EXgQ3PBZEysPxARDR2x0HUG+Dbqz8creWRCnUr3mm9WpsgAp0a:l3LX5ZWAOvLmzFRCnG3ml+fua

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5662683474:AAFvSjyPXTiwhBPcFi8of3_-_FCdfhhN8x0/

Targets

    • Target

      invoice.exe

    • Size

      817KB

    • MD5

      65cf9f513fe65960aefc49c2d270d924

    • SHA1

      dac0a821c5b634f56af5831af625876ce6597564

    • SHA256

      fcd3ba5e5f78af587c276aa85311f797b47d652dac19566d0702a5065d47c2c1

    • SHA512

      c8544a2fef5cf7e42e2ea05297e0908add8408b4f73ecc87df067f4be2d0f6410ea2896215f41c933607cde279efb596789f8886ffe56564f53137f5d002c215

    • SSDEEP

      12288:lsM2iNUADqjJ5nqjy2q9nqLaWs6nluh8FLVZiUoH6qBpZ/I/x:lsM1Ajr/3WvP4HlBU

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks