General

  • Target

    PAYMENT ADVISE_0004.rar

  • Size

    652KB

  • Sample

    221208-tkbqmsad93

  • MD5

    71f4964b8edf5560c36a4ad1a1b61408

  • SHA1

    4e19db95261c652678f49c54c7763286f340828f

  • SHA256

    19aad89e62883b8ead9db879fd1203dd51a2eeee41d0748a81c7b31c6237babd

  • SHA512

    712adfd0852e879a7d0baf1f3419e2da41b721c8af4e33f449c29312980e8cc3f0eea60f18cfd758c5f455ca389b4cec48892986e8673edbbd08412e05452e18

  • SSDEEP

    12288:o4a4f3OgBYmD12aaLzIskrkk4yzFLmGY7lryP1iZmKbAGZQHMjsTaqFZp5R0lmsx:4e3O8lanErlmGY7luPlKsssGYTi5F/

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1046885137620668476/tqKDZZWFXo6nvWfx10p4wfxf1QI6_dSmYl-LLQGbb4vhhmp9HT4sLvTVg0kj1SgRTQGZ

Targets

    • Target

      PAYMENT ADVISE_0004.exe

    • Size

      841KB

    • MD5

      c57e9585bbe179e45833e8b896c73e29

    • SHA1

      1c0aa52a527f919f0e575e00dcb7023c553f9d5c

    • SHA256

      0a87339cba74896d097ec10a18315d66dc3f98121ba968ff571a29e241646b60

    • SHA512

      15b2b749010b6da998063d24aa75a38b0fdda79c523f99b2ff1cc074f64d6551b5854a09adf44df434e4ede55e7562535650e54445bb94096620e10360575263

    • SSDEEP

      12288:F/hXvkIY0GZa/4y1v8Vdv+UF9Co2dLi78dkLgxlkg586aWHffauQOQWM6x5BbWIb:8B03giZUFZ2dLg/gxlB5O8f4b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks