General

  • Target

    SEAWAY BILL.r15

  • Size

    914KB

  • Sample

    230301-scsthsgb91

  • MD5

    02af574b3d69cb4200dd54816efd871a

  • SHA1

    b4669a56c6273279ee70bc3ab68952afeca70b3c

  • SHA256

    2ceebe62d2f9c3ee6dedd3ce056ccee9eb49b72c3e2427d936255b2148892ed8

  • SHA512

    56635db3af73192b2db5f4348272a463ccd4f4ed3ad78e167a9fc344cce5e0ce43843786b2000661bb23b9c60590a6a9378e6ad070f62a575de464c2e8348a58

  • SSDEEP

    24576:pIaK0IiufIZJCHMGjYCpS3Px2PQ3+GEoFXpwrxyJ:pP/ZJCHdMC+xoQHpwrxG

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5818759233:AAFI7OlL_xF1C_H7nxAtSweMNNwegCdZOXs/

Targets

    • Target

      SEAWAY BILL.exe

    • Size

      1.1MB

    • MD5

      fd5a7296c27d4c010932880f1076eff3

    • SHA1

      57fb293894a7a6a0dca55e8e0c7d70c0e0c4ead3

    • SHA256

      5a67a6ba0bdce0f79f4086b0648b6a6b7484561fae29ba6f7b48bcae641f2f59

    • SHA512

      fb7333ae64228c4bb195048a81855fc8711bc5f1ba77fb08c2731877353b565531ad6bef919058e400a7c102fc27a009b77bd4e8f21ad06a5d78de278fc60799

    • SSDEEP

      24576:1Sd4TsIBMNjnNNOhAe/S0FVL8mcwE47iK+hTrPi7wHTaybeAqVf2lQaUd9uvkiwV:XJcA78PFHuyIV++aOuv83l

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks