General

  • Target

    ORDER ENQUIRY.doc

  • Size

    5KB

  • Sample

    230213-lfbwvabf4t

  • MD5

    f171857a9cc7939cc152f43316ee30d9

  • SHA1

    50a88884f5cae5469a6558e67fbf3bc12b473a5b

  • SHA256

    74a772134e325f53cb54809a228f2cf32763ecd6138d67160d9ab14f6e65ed4b

  • SHA512

    b4f6b2f8ba31a817ab502bc8332286fc0707ad94ffb254b5e2afdfe5f486fdf9285f33fdecbd9fb973faf4dfbf4ca565547503b8238dd3af4b1e3aa80ecb2216

  • SSDEEP

    96:AiAAwiD2riQQvYMM+nHkWQ8hS+FueiyMolGj1U:pAAwivQQv8W5S+Fue7MolGj1U

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1073351841217261789/NnPDWHoGskysnt_cVO37Yvso4HCKBMX4OJzJQ65V2g-M4gX029QlSHO_kclyL9PXI8Lw

Targets

    • Target

      ORDER ENQUIRY.doc

    • Size

      5KB

    • MD5

      f171857a9cc7939cc152f43316ee30d9

    • SHA1

      50a88884f5cae5469a6558e67fbf3bc12b473a5b

    • SHA256

      74a772134e325f53cb54809a228f2cf32763ecd6138d67160d9ab14f6e65ed4b

    • SHA512

      b4f6b2f8ba31a817ab502bc8332286fc0707ad94ffb254b5e2afdfe5f486fdf9285f33fdecbd9fb973faf4dfbf4ca565547503b8238dd3af4b1e3aa80ecb2216

    • SSDEEP

      96:AiAAwiD2riQQvYMM+nHkWQ8hS+FueiyMolGj1U:pAAwivQQv8W5S+Fue7MolGj1U

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks