General

  • Target

    PO#JB2210-0005.exe

  • Size

    1.1MB

  • Sample

    221027-jrjdysbdg8

  • MD5

    5f4e321afe6c6ed548bd0b0639a9becf

  • SHA1

    ad5d36422703881da14c98dd1423492af8113092

  • SHA256

    0a0286f5c4b0657f3e4e961241d0b127810135e726de296c914358e97d983e98

  • SHA512

    78d45e03d2134d9aa4292d0f76a8a9b4de17877552c67d92b38e4487baaae15a41603d6dea8e4f1d2054add740d73974ab5415f3e25c629bf309f0e060e0a799

  • SSDEEP

    24576:d4jt/DxX2ZyrRT6nbS2qyTK1TT1bB2QwTFa0dszfqJ4VB2sh:Kjt/8y6cyTK1tbcXTFaqszfqJ4L2

Malware Config

Targets

    • Target

      PO#JB2210-0005.exe

    • Size

      1.1MB

    • MD5

      5f4e321afe6c6ed548bd0b0639a9becf

    • SHA1

      ad5d36422703881da14c98dd1423492af8113092

    • SHA256

      0a0286f5c4b0657f3e4e961241d0b127810135e726de296c914358e97d983e98

    • SHA512

      78d45e03d2134d9aa4292d0f76a8a9b4de17877552c67d92b38e4487baaae15a41603d6dea8e4f1d2054add740d73974ab5415f3e25c629bf309f0e060e0a799

    • SSDEEP

      24576:d4jt/DxX2ZyrRT6nbS2qyTK1TT1bB2QwTFa0dszfqJ4VB2sh:Kjt/8y6cyTK1tbcXTFaqszfqJ4L2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks