General

  • Target

    QUOTATION.exe

  • Size

    744KB

  • Sample

    221029-fjjszabgh2

  • MD5

    bd55e25580b4fe04edec2a8a57286b56

  • SHA1

    6ee1459602fb4c371a92689eeee5755f59091cb3

  • SHA256

    7272c6701d3cb62e2e843ca2690ab0aea121b0404b59fe8b58e1d0e85df351e6

  • SHA512

    971eb70a023652a2156c19a0546c45f385c459b9c4812d42b1504b1ba987d0d964ec3052e788b0f69a608bf1a2974ff925a0f5c3c1b9ecdc8e2c8dcfc4385c11

  • SSDEEP

    12288:EMAgHtDg5xE1gpiPHhfX32ZTHbLW97MJ3kXEwVosEXAAMdVorLb355w3z5LErq:EY4BoPHhfXGZbbLSMJ1wVr5AGorX3g39

Malware Config

Targets

    • Target

      QUOTATION.exe

    • Size

      744KB

    • MD5

      bd55e25580b4fe04edec2a8a57286b56

    • SHA1

      6ee1459602fb4c371a92689eeee5755f59091cb3

    • SHA256

      7272c6701d3cb62e2e843ca2690ab0aea121b0404b59fe8b58e1d0e85df351e6

    • SHA512

      971eb70a023652a2156c19a0546c45f385c459b9c4812d42b1504b1ba987d0d964ec3052e788b0f69a608bf1a2974ff925a0f5c3c1b9ecdc8e2c8dcfc4385c11

    • SSDEEP

      12288:EMAgHtDg5xE1gpiPHhfX32ZTHbLW97MJ3kXEwVosEXAAMdVorLb355w3z5LErq:EY4BoPHhfXGZbbLSMJ1wVr5AGorX3g39

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks