General

  • Target

    commercial invoice-AD1-2001028L.7z

  • Size

    2KB

  • Sample

    221123-kbabsacb7y

  • MD5

    e59855e2e039995dd9f6567b29a9f629

  • SHA1

    8b027f3acf1dd8b0ea775316af302ec05d1e189d

  • SHA256

    c2f3e70421ccff4ebd8f81672079ebd556617048c57ef949011b2282e3124e47

  • SHA512

    92a40f7521bb2928a831131b8b7d62946874b90af76de1f06a2f7fb49a5124c476d5dee6aabd5c32454ab77c7648120249ae74774a2058206a132cc50149b5cd

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      commercial invoice-AD1-2001028L.exe

    • Size

      6KB

    • MD5

      8d936312a59afa52e18a4d665755690d

    • SHA1

      aa34c27cdf073eb5c54e371714d3d68a626bbbd8

    • SHA256

      ee511bade3822feb689576b65cb3e490e9459c11c5b6583b36920f742c1bd99d

    • SHA512

      b36924fe5af405e6447fbf01d6d9c75cfe9dc335e36b64ea8982e59a1d9ac48dde4855f5c84cdcc21fb4d4dcbbfca1e485bbd32f04b10d67c1dc577aab9abd65

    • SSDEEP

      96:awqkGAzKfGe7DVys+BWfik85EOd/vSGQeMFnU:N4DUDEPYEOdES

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks