General

  • Target

    DHL PO1001910 Sample Arrive.7z

  • Size

    732KB

  • Sample

    230317-n9qyzagb33

  • MD5

    97f0073853faf6386c475cf2cbdfe757

  • SHA1

    68dbafb6541b54a9b6ee66fc22bbce1b3624d268

  • SHA256

    c548ee70242147de73e5bb0f457247679adb045a82930be9c3e90b8c383d74cb

  • SHA512

    21cdbcead951e88f72dd9ad7d7c216ddfa098cea5b8ffc29529176b01f4bcc3e4bad9b0b4b08a6a9396eab95f3ebec2af6e3eff0fb446232ab95e9f8935f2363

  • SSDEEP

    12288:ju6EYCUZgGeTrS8IYGEJvoXhjxLdtUMaRBmmm2dJcr4/OAETArEa6kYiBe/UgpnL:i6EzUZVCS8imvox9xOMaRBZhckxQArNo

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      DHL PO1001910 Sample Arrive.exe

    • Size

      1.0MB

    • MD5

      d1399aaabd8c5ae0e687e148e7708498

    • SHA1

      74b155b196a1b82416f2b5e196c55d76ee047b4e

    • SHA256

      96dc07c4fc7b8ad2d15f5886dd7c59b7b3ef0a393b2a8605fa3e7e4966a5cbf9

    • SHA512

      480fff4705e395f65c033f240fae48791248eb98edd900e3a58caf0672fd7ae1a5e580f2166e1b021add0b769babb5595249a2fd201105ffe6ee15e43c85c1be

    • SSDEEP

      24576:W/jkj+gMWKS0KgvGo9xCEWdrZY3kKzAFlb3w1q:W/jkCSPgeo9AEWszs5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks