General

  • Target

    priceandavailability.doc

  • Size

    62KB

  • Sample

    230307-pg6z6ahc7s

  • MD5

    8d074b8561b7bbaa71fd8dba9fceea7a

  • SHA1

    b2ecc0f79937c68157faa4360be5680225f4dbf0

  • SHA256

    96c9a2419e229bd026e7b73ad44ae7816d10e8aa3cec41e8de73f89edf430286

  • SHA512

    ff56f2029b408fc54a637adbb5be2c5a4e9123d19fc9b944a8d38c4d19a7321e5cba009c15ba5ab8fa1be6d1594e4e30dac54f2af842bda3ffc3cf0e54339148

  • SSDEEP

    1536:QwAlHZromd3Ciyqo0FcbGbP8VL9IEzQV3ZuD2Q0Fx5e/9HjCZDrw52vmYvYfI:QwAlHZroS3JyqoiTP8VL9ICm3ZuD2Q0j

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      priceandavailability.doc

    • Size

      62KB

    • MD5

      8d074b8561b7bbaa71fd8dba9fceea7a

    • SHA1

      b2ecc0f79937c68157faa4360be5680225f4dbf0

    • SHA256

      96c9a2419e229bd026e7b73ad44ae7816d10e8aa3cec41e8de73f89edf430286

    • SHA512

      ff56f2029b408fc54a637adbb5be2c5a4e9123d19fc9b944a8d38c4d19a7321e5cba009c15ba5ab8fa1be6d1594e4e30dac54f2af842bda3ffc3cf0e54339148

    • SSDEEP

      1536:QwAlHZromd3Ciyqo0FcbGbP8VL9IEzQV3ZuD2Q0Fx5e/9HjCZDrw52vmYvYfI:QwAlHZroS3JyqoiTP8VL9ICm3ZuD2Q0j

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks