General

  • Target

    SHIPPING DOC.zip

  • Size

    304KB

  • Sample

    230208-pcqsdaab3x

  • MD5

    7e27729f780e9da172d75ff02d84120a

  • SHA1

    fdc10d9b61cc24061e59cc6ff84be8ba88926566

  • SHA256

    829fedfd6f7e2d6dc3476e2ddb808b305fa4a3fe47798eafbd56419afb727ec1

  • SHA512

    a140a627022767e310f21a0716c12025e328cb8d8ee9030d8ee19a28b481db1c17fbc3e676a7d295700e4075a1accf24ad911c17bd1a5acf40bb5794b3b62276

  • SSDEEP

    6144:g/jUb7Z48G42uQzEAZfBQnfx4S6nLvnlGVsUe6W67wXa2rAZazCSM6:grUbVk427zEcQfSSUvnlGVNZWiwXa2Dd

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SHIPPING DOC.exe

    • Size

      318KB

    • MD5

      f0df3f64cd9ebf1a531f4e8b5dec03be

    • SHA1

      f7ccc908d93b1ac35772d6b0828483bf8a228b96

    • SHA256

      3652bafc6040261b1ee34d360ca1f2a28277a258e9ed843ff0b8c846df58f8ca

    • SHA512

      34c8de594cc92c3ff8180e3b68ab4fae1eab89a9a808f1307a3104a83e0011de59280039cef677de802746dabb3df196cdc058493388b3017386bc6349d869b9

    • SSDEEP

      6144:vYa6fi4AuazCAnfpQ/bx4S6RLvnNGVsGe6Q67wX+2j2ZazCJMG:vY1i4A3zCaQDSSMvnNGVHZQiwX+2BTG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks