General

  • Target

    Invoice-VE 2022.xlsx

  • Size

    597KB

  • Sample

    221006-l58xwahcdp

  • MD5

    2b2b89ac962ffdd39096be0b76bb184b

  • SHA1

    6bac70c673543e8d4f5c9e3143b860d9841fd4fd

  • SHA256

    dca1bbe366193fa0bc12a708f3873a5fc0ca9c56378c2275e24d9ed37034e9d6

  • SHA512

    2ed5527d4b1e376980214cea41be37659de79dc635b0e5c69fec5b42d239330c4b1d4f259ebec1d0ce05ba0eb4b9c9c6df04708a970fc149733afea242ffdaa2

  • SSDEEP

    12288:mVhc9AFij/oTquIeUTtNd+bxVdLW4ZpOc9bJNrfag:ohc9s9quLONuXoAtNGg

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5508236836:AAFWgQnjxVK5WcJGJYoL3kmrCQIOg7yCfKI/sendDocument

Targets

    • Target

      Invoice-VE 2022.xlsx

    • Size

      597KB

    • MD5

      2b2b89ac962ffdd39096be0b76bb184b

    • SHA1

      6bac70c673543e8d4f5c9e3143b860d9841fd4fd

    • SHA256

      dca1bbe366193fa0bc12a708f3873a5fc0ca9c56378c2275e24d9ed37034e9d6

    • SHA512

      2ed5527d4b1e376980214cea41be37659de79dc635b0e5c69fec5b42d239330c4b1d4f259ebec1d0ce05ba0eb4b9c9c6df04708a970fc149733afea242ffdaa2

    • SSDEEP

      12288:mVhc9AFij/oTquIeUTtNd+bxVdLW4ZpOc9bJNrfag:ohc9s9quLONuXoAtNGg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks