General

  • Target

    Customer Credit Transfer.img

  • Size

    1.4MB

  • Sample

    221020-l15pnagegp

  • MD5

    bf49c854997936ddc18fb144bc02ae66

  • SHA1

    da20bd84d6f5407d0d9c973e703cac294902f99e

  • SHA256

    d362820595a2af8f945673bff5504d37b6425112be9cc0256ae17ade7aaed13f

  • SHA512

    d1034a17dad009524baa8fcd22054e98e3e2646053375101e375107b4fc9531fe7f35b847f2f072fb49aa18742d5ca25dd40883e3b1610759ddc222819af471e

  • SSDEEP

    12288:ezfEu5TZBWRBO/TG6g/CdXx92Ltm+lya4gylPsIcIMU8fYtYiAUz:aZW2SZl94gylEIcIB8GJz

Malware Config

Targets

    • Target

      CUSTOMER.EXE

    • Size

      839KB

    • MD5

      5f823a1ea6d64bfdfde655735cd2bd53

    • SHA1

      0edd4a3375d860ff3f5c66f4a2843994ba9f227f

    • SHA256

      8e4b7cb2dd61f0663ee762183b5af3713dbe7bba63b780805270d4d4dbd6dcb2

    • SHA512

      78982807412333116ca7513dbb682b256557cd2df62e77c5f10d4799ceaab18eb3fe2a24124f9668c373d890f565eacb7661d5d4f8f652c93c93c39a522b2a71

    • SSDEEP

      12288:MzfEu5TZBWRBO/TG6g/CdXx92Ltm+lya4gylPsIcIMU8fYtYiAUz:EZW2SZl94gylEIcIB8GJz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks