General

  • Target

    KWIIR00322677.exe

  • Size

    717KB

  • Sample

    221103-allsfsdab9

  • MD5

    33d5fc877829686038e66c40586ad884

  • SHA1

    ddd9de3480e308c09419414ff0a0c794b0e71a81

  • SHA256

    8bcf90e098c3d656623cfcef91ba7604b54c5681ea93e107c54c337724ce8beb

  • SHA512

    b43754f836a08c8c6d94670e57b57cefcbcaab1f9894333b857187086062ad9ae1a4b8eeb5926d6a3b59c707fe58fc366cb10b377cf7b01d6f2d84f9a4942e70

  • SSDEEP

    12288:Yk/NhqNNWp1NMPsKq3uUzg89oZBJpGHa91Pj7JV2lQHuWSF3x5wKZkfJMEE4UiA8:L2YSNq3uUzDkpGq/4

Malware Config

Targets

    • Target

      KWIIR00322677.exe

    • Size

      717KB

    • MD5

      33d5fc877829686038e66c40586ad884

    • SHA1

      ddd9de3480e308c09419414ff0a0c794b0e71a81

    • SHA256

      8bcf90e098c3d656623cfcef91ba7604b54c5681ea93e107c54c337724ce8beb

    • SHA512

      b43754f836a08c8c6d94670e57b57cefcbcaab1f9894333b857187086062ad9ae1a4b8eeb5926d6a3b59c707fe58fc366cb10b377cf7b01d6f2d84f9a4942e70

    • SSDEEP

      12288:Yk/NhqNNWp1NMPsKq3uUzg89oZBJpGHa91Pj7JV2lQHuWSF3x5wKZkfJMEE4UiA8:L2YSNq3uUzDkpGq/4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks