General

  • Target

    BL_CL-2838374_3494432_Docx.XZ.xz

  • Size

    612KB

  • Sample

    230213-qtj7ladd96

  • MD5

    04cd8990a80cfdd8c38de77cd47bcb4a

  • SHA1

    ffb1dc41c05039d102582eec6145024573ed8bb5

  • SHA256

    4cfe6ac8a8099f7549f14d3b8ea42af6f35807b5031843b589d24e94db8f0a4e

  • SHA512

    5d8bb2ce84ce09bb479f3ef210e0a7498974488fd6ef15d7868d2b2c9eeb130fcb7b07f52fe57df88ce01462c14475e38ee786c7e1f309ce6172bcc642253fd6

  • SSDEEP

    12288:t/7wZ0EhhFbKERPO893RxuItaiDiYJ8UggCFYAV2nIIIL03bdcI5da18:tMZ067mMOeXuItaiGK8UgSArwcea18

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    $ORIGIN2023

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      ACCOUNT_STATEMENT.exe

    • Size

      849KB

    • MD5

      828d66f472a33813699447f0888e275f

    • SHA1

      55cd9561289e4ddcf9f8c82ea2a1a70602cce710

    • SHA256

      bc8adaeabfbb712f8af4274072205059dea9d81f0e09016531d43ebcb52c5db7

    • SHA512

      3d7ebaeb205d5d0af5479d7331c4a52e409764968e3e2c51d7cdd1453edb9575c70d370625ca5baaea7304aa86a58ca231fab73797d133c44da503ebf4bc9daf

    • SSDEEP

      12288:PftD84yMmwxSrioOKHOv0MJONTYFgO2v5Fs14AGpd51Ng:ntY4yMmwxS1O8TX1vDsgd51N

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks