General

  • Target

    DHL AWB - COMMERCIAL INVOICE, BILL OF LADING, ETC DOC.exe

  • Size

    886KB

  • Sample

    230112-q8rvzsgb82

  • MD5

    de4e94b9cdaec8b858cb6784cbb0e5f4

  • SHA1

    1076ebc249a2e3031ecaa17879fbf740e4ff66f2

  • SHA256

    f77fe8a7ebe7c42c57282c9cd76924949352b8ea05b9f4225508f815c6ae2aa6

  • SHA512

    93b7771c6308bdfb20331674abbde7d79669834d916cb85cc4738bdd4f85451a419e0be89ce0cc5c050f980f8f86b6f9534b79922e4842b326e31985d8ce64eb

  • SSDEEP

    24576:P+X+RblGyXxTEb8E03mh3xiJZtSKIKTn6AL:PbA58FWh6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.nutiribio.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zGNVO(l5

Targets

    • Target

      DHL AWB - COMMERCIAL INVOICE, BILL OF LADING, ETC DOC.exe

    • Size

      886KB

    • MD5

      de4e94b9cdaec8b858cb6784cbb0e5f4

    • SHA1

      1076ebc249a2e3031ecaa17879fbf740e4ff66f2

    • SHA256

      f77fe8a7ebe7c42c57282c9cd76924949352b8ea05b9f4225508f815c6ae2aa6

    • SHA512

      93b7771c6308bdfb20331674abbde7d79669834d916cb85cc4738bdd4f85451a419e0be89ce0cc5c050f980f8f86b6f9534b79922e4842b326e31985d8ce64eb

    • SSDEEP

      24576:P+X+RblGyXxTEb8E03mh3xiJZtSKIKTn6AL:PbA58FWh6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks