General

  • Target

    RFQ102922-RFQSharjah Oman Engineering llc.scr.exe

  • Size

    368KB

  • Sample

    221121-wt3xlafd7t

  • MD5

    d41ab848116dc5ef660ecab86d3f2eba

  • SHA1

    d1ee44d027e5d23cb09b7869f6df3df517906cff

  • SHA256

    ab0a87ce5b49af8387b69e87ce50fec40769bbead62005ca2c6969321ab31f1e

  • SHA512

    4951923dd0a48e8757f1fc1507b0f11f901add90c95df65ed07e6ee3f0e654b111368c3a41fe904b925eacb26763571d27e45bcfa2e079cc6f04d05bc421a40d

  • SSDEEP

    6144:1Ea0+IRp74gy5yWp94iwIvkYoczdWTnovZp/Zncp6/dJ5dD2Rep/77yjZ:JIn7Zy5yQ69WYcxti8dD2cp/77UZ

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5472075572:AAH72ryjgTKG52VYCqF2mpPaWaPLe7C91tE/

Targets

    • Target

      RFQ102922-RFQSharjah Oman Engineering llc.scr.exe

    • Size

      368KB

    • MD5

      d41ab848116dc5ef660ecab86d3f2eba

    • SHA1

      d1ee44d027e5d23cb09b7869f6df3df517906cff

    • SHA256

      ab0a87ce5b49af8387b69e87ce50fec40769bbead62005ca2c6969321ab31f1e

    • SHA512

      4951923dd0a48e8757f1fc1507b0f11f901add90c95df65ed07e6ee3f0e654b111368c3a41fe904b925eacb26763571d27e45bcfa2e079cc6f04d05bc421a40d

    • SSDEEP

      6144:1Ea0+IRp74gy5yWp94iwIvkYoczdWTnovZp/Zncp6/dJ5dD2Rep/77yjZ:JIn7Zy5yQ69WYcxti8dD2cp/77UZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks