General

  • Target

    Servo purchase Order.zip

  • Size

    304KB

  • Sample

    230301-k8fvtsfe68

  • MD5

    64325474ecdc8b4f278322086c593c42

  • SHA1

    76b4c673645fc45afcd61c0d1c12de932fdd22fb

  • SHA256

    ab9069af38e75eafdd34fb782a1f99f96e4c8cabc0ac9c0022b5c96e5b08b058

  • SHA512

    7b94a2ccb9d11640326f5185a43a476bba5c36c8d7f3929b7516becc2d26fbc62f9bea7c3b5a5010bbd5f35b7f03b92ffa82b0c9b922b8c9c4f5777addec4e3a

  • SSDEEP

    6144:L/pHIONP2WE/TeaHKqUc1/3AZ+z/VdIawLoTAyWd0o8Yv:LBHIOh2VqSpUc1k+8eAyWdJv

Malware Config

Targets

    • Target

      Servo purchase Order.exe

    • Size

      318KB

    • MD5

      eeb2586b016149e4ac3fe2b099b0373e

    • SHA1

      5f30d98b1ea3aa8ca086bcbfa8ae4d5df7081466

    • SHA256

      644ba86dd5681951ce4ee926d5a596de429ae7c161bb9de32a7d8e825986585e

    • SHA512

      c529069cfd6588801e4fc02dd91d1fedcb117e19ee87f7e14dd52e5eca2ee477e8cf2a0253346aaddb82037add62b5be9c22aad1e5dfd1edf24d0513bbd99337

    • SSDEEP

      6144:vYa6eueeIPSWE/TeaHGqUcj/3AZ+zLVdIa8voTAyWd8o8YE:vYguVKSVqSVUcjk+ueAyWdxE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks