General

  • Target

    9CBBEF1B18223971F98CCAC5CD55B0C971DAE0398C462BC938136801DB07F142

  • Size

    262KB

  • Sample

    221208-yffw1seb5t

  • MD5

    50b76f11a4a78384a6feeeedc1802dc2

  • SHA1

    7aa9b456315bc88c9d18590f51c4240e6e96a21b

  • SHA256

    9cbbef1b18223971f98ccac5cd55b0c971dae0398c462bc938136801db07f142

  • SHA512

    32196b7fa59fbf998fc37a1d0412fe2caf52c58358b7428f61149844fc8a1be20bd2c55e1f69b4a51cf1796879fa5094268979920bdfa94ed735b26526d6f093

  • SSDEEP

    6144:ssh2D2xxDayiVfxrPhiG6rydsraT4CasuKA47jJCNsa5xm7H0+9:s0xZnM9PhiG6UBuKA4es0U7Z

Malware Config

Targets

    • Target

      Pagamento do saldo remanescente de novembro - Q002230A0000000001122.....exe

    • Size

      274KB

    • MD5

      99306b523906fb0638b692ffc3a64a37

    • SHA1

      f283c20a4fa1544d705a1dbedcceef160fe381fe

    • SHA256

      f0da229cd56486cb27d1465410147676261d663a62aa9e95f27fda1b2ee5a662

    • SHA512

      f842376ac9821ee248fb00d568fafabdae29443906614ba5020796e78e34c13a93c13aeb3d73d162f07d887de19409c8b085a1f1a3b1561155fab5beb65f6ef4

    • SSDEEP

      6144:QBn13xZu6bcMmMBpBCYF+iR9tfgcjhn3tu+VBjUYqqXuUNJFLa:gTPXpRdtfgcdu+YyXuUNJF2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks