General

  • Target

    SWIFT DETAILS 880.xls

  • Size

    1.3MB

  • Sample

    230302-pl66qace4v

  • MD5

    7f49b8b2255418be5455193efc2e23d0

  • SHA1

    f0d82e029d5849556f448d2871640712ae356856

  • SHA256

    83263ffc77883d837d86f0245cab740b53f033b42a38a03b6fe6e4c4efc78e95

  • SHA512

    890ed223b5757baf1ea02155e6eefa476511d3e74fc543ecc5e80c8e20595b2243c8460c31bbe3fc5fb8d9e1d2e7235ea23487647698c4646e1016754c0fabb5

  • SSDEEP

    24576:hLKCWQmmav30xaBKWQmmav30xRyWQmmav30xrBkIWQmmav30xE6EDtOpoufjbeXX:hLKHQmmQ30gFQmmQ3073QmmQ30lSdQmB

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SWIFT DETAILS 880.xls

    • Size

      1.3MB

    • MD5

      7f49b8b2255418be5455193efc2e23d0

    • SHA1

      f0d82e029d5849556f448d2871640712ae356856

    • SHA256

      83263ffc77883d837d86f0245cab740b53f033b42a38a03b6fe6e4c4efc78e95

    • SHA512

      890ed223b5757baf1ea02155e6eefa476511d3e74fc543ecc5e80c8e20595b2243c8460c31bbe3fc5fb8d9e1d2e7235ea23487647698c4646e1016754c0fabb5

    • SSDEEP

      24576:hLKCWQmmav30xaBKWQmmav30xRyWQmmav30xrBkIWQmmav30xE6EDtOpoufjbeXX:hLKHQmmQ30gFQmmQ3073QmmQ30lSdQmB

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks