General

  • Target

    INV & Packing List.exe

  • Size

    807KB

  • Sample

    221125-r9ahrsaa4y

  • MD5

    40264f53f0f83bfd21df75e22db2b0ea

  • SHA1

    93171e1bd1c33212724b3b3e5238f0c83531fc7e

  • SHA256

    caef9e906b0768d4134a8fc2a9523554b23bb9980668c299106d1ace32cbbaef

  • SHA512

    7f7f85a39e3bce3f3c0465c97a3367f2d2860bfeb67d3f7a17f8342c7742d1280681fdefda5d1f418f64da22b7e6877e677134d8c36628389c06f4465fe9bfd6

  • SSDEEP

    24576:NU676CSkFg/IyXt5TKhwlZzE9H/0XPG5X:KlkoXfxZsf6Q

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      INV & Packing List.exe

    • Size

      807KB

    • MD5

      40264f53f0f83bfd21df75e22db2b0ea

    • SHA1

      93171e1bd1c33212724b3b3e5238f0c83531fc7e

    • SHA256

      caef9e906b0768d4134a8fc2a9523554b23bb9980668c299106d1ace32cbbaef

    • SHA512

      7f7f85a39e3bce3f3c0465c97a3367f2d2860bfeb67d3f7a17f8342c7742d1280681fdefda5d1f418f64da22b7e6877e677134d8c36628389c06f4465fe9bfd6

    • SSDEEP

      24576:NU676CSkFg/IyXt5TKhwlZzE9H/0XPG5X:KlkoXfxZsf6Q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks