General

  • Target

    Order 2550619.xls

  • Size

    1.7MB

  • Sample

    230309-wqarmshe68

  • MD5

    ab0e612c9439b82195398504a698adee

  • SHA1

    70c4113ed426af85cc7c5e37b35f8f061c15c5f0

  • SHA256

    9134e36de0aacecf0cab994a307c42bd76a067d032545e74328d1c29c6389ebd

  • SHA512

    90741688665e6fa8c9a91b63ebaa956ad366cb268436034c19e7e133d8d564c1e95c6cacdc76ef5196adcb665ebe4a0bfa6383c3f996a9ec6b56c1472be02c3e

  • SSDEEP

    49152:hLKe3Z7sQmmQ30d727UQmmQ30R6Nn1h9DB6GOLD5:lhspmQkl6UpmQkR6rhPON

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Order 2550619.xls

    • Size

      1.7MB

    • MD5

      ab0e612c9439b82195398504a698adee

    • SHA1

      70c4113ed426af85cc7c5e37b35f8f061c15c5f0

    • SHA256

      9134e36de0aacecf0cab994a307c42bd76a067d032545e74328d1c29c6389ebd

    • SHA512

      90741688665e6fa8c9a91b63ebaa956ad366cb268436034c19e7e133d8d564c1e95c6cacdc76ef5196adcb665ebe4a0bfa6383c3f996a9ec6b56c1472be02c3e

    • SSDEEP

      49152:hLKe3Z7sQmmQ30d727UQmmQ30R6Nn1h9DB6GOLD5:lhspmQkl6UpmQkR6rhPON

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks