General

  • Target

    Q-105038 MR-47237 EL HOSS.zip

  • Size

    474KB

  • Sample

    221123-p7hegsdb86

  • MD5

    f353048bd38fc93f115d4541888c65e1

  • SHA1

    efc51a51e6ece4ffec89f1eed23f569beedafb43

  • SHA256

    95cc5228d7b2fbd8bea9e178e4093f45577e217972215a0ba924b88302b67cd5

  • SHA512

    4921789e76144f3b0bdb70328d35a5bdb459bf5490e820adc090076a3a4ae3f2399096f34f83662ec7db2844f7ae5b6eff7880487bd456874d97f2d6bb295aa7

  • SSDEEP

    12288:6n4xouOWe4Bcw7loOy+7OoGDL846WF9kB0gV1:6n+orOBrh9y+y3DLZFQ7V1

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Q-105038 MR-47237 EL HOSS.exe

    • Size

      572KB

    • MD5

      e10777c560dcacc0537c588c2999bd7d

    • SHA1

      127b2a6444a323070ec31643dabfa3803ffe2ec5

    • SHA256

      5b72b74c569f9a1593b4bf313a02db7e10f9e8ffb5ed73ee73ed76b1c53ad13f

    • SHA512

      9339898e57c77be6966a1cab1fb39860b720e762fabcbfc8c21ebf5d3995b4c907910536eb0415a404dce2e9d06dc5176d2ef6b8e1620370556798a7825eafb8

    • SSDEEP

      12288:Ox3aWpUo67IMwM8yzwElEkj76s4DSABfUnNI1ic6DlQOys7OoG7P8M6cFmX3Z7i:l6s4DSuUNEiT5Fysy37PjF6l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks