General

  • Target

    Shipping documents.exe

  • Size

    461KB

  • Sample

    221125-f25hdsde78

  • MD5

    893aeb0f5f4438e2748e580c130e100f

  • SHA1

    f45b94c1568625c4b3507ea6c37c70a35344cad7

  • SHA256

    b51a2616cda21a22be90fe6587e67a44675ee5daf65dcc18bb1516a09090bc43

  • SHA512

    6e0e1f47debf1ebb1668c96c24dc1fe1dc5eaa9aaa2e9e27cd80df3c3f1fdabc7b414e0c0974e20a8fa09390e6ab6b15f645f905828617577f041f2e24a9f1f2

  • SSDEEP

    12288:HtQQXMENB9eh32XY7H/kiMpCJhnfZVCR4an2PAa:HuYGzkiMsJhnfG4a2PAa

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dms-est.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ab7865

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dms-est.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ab7865

Targets

    • Target

      Shipping documents.exe

    • Size

      461KB

    • MD5

      893aeb0f5f4438e2748e580c130e100f

    • SHA1

      f45b94c1568625c4b3507ea6c37c70a35344cad7

    • SHA256

      b51a2616cda21a22be90fe6587e67a44675ee5daf65dcc18bb1516a09090bc43

    • SHA512

      6e0e1f47debf1ebb1668c96c24dc1fe1dc5eaa9aaa2e9e27cd80df3c3f1fdabc7b414e0c0974e20a8fa09390e6ab6b15f645f905828617577f041f2e24a9f1f2

    • SSDEEP

      12288:HtQQXMENB9eh32XY7H/kiMpCJhnfZVCR4an2PAa:HuYGzkiMsJhnfG4a2PAa

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Sets service image path in registry

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks