Resubmissions

03-04-2023 18:17

230403-ww794aab7s 8

03-04-2023 18:16

230403-wwe9baab6x 10

03-04-2023 14:33

230403-rwvlsafc83 10

General

  • Target

    DOOR-MET_23045112.exe

  • Size

    658KB

  • Sample

    230403-rwvlsafc83

  • MD5

    f4a6d37fefe83f89c2f6b1f253bb9c2c

  • SHA1

    58ac04dfcc1f0bbf7c41181102f9371a67cda336

  • SHA256

    788e583861d0022304a8013dcf66be0e312402d6154f5a7788f1d67518583c7e

  • SHA512

    37f6a03d1356aa442ddc61c230549282fa5f5ce8d3aac4792e26cbbb51f75090b0ab8a0e9139304ee6b89530662cf2ee24033573b80f8b81a27fbcf6ee220e0f

  • SSDEEP

    12288:q6okzy/q4JM4Q2lQfzwcIDNEkxtdBo0hoay47DKWMH29yoNSDA:Sku/6gQMc6uqhrqW/N

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      DOOR-MET_23045112.exe

    • Size

      658KB

    • MD5

      f4a6d37fefe83f89c2f6b1f253bb9c2c

    • SHA1

      58ac04dfcc1f0bbf7c41181102f9371a67cda336

    • SHA256

      788e583861d0022304a8013dcf66be0e312402d6154f5a7788f1d67518583c7e

    • SHA512

      37f6a03d1356aa442ddc61c230549282fa5f5ce8d3aac4792e26cbbb51f75090b0ab8a0e9139304ee6b89530662cf2ee24033573b80f8b81a27fbcf6ee220e0f

    • SSDEEP

      12288:q6okzy/q4JM4Q2lQfzwcIDNEkxtdBo0hoay47DKWMH29yoNSDA:Sku/6gQMc6uqhrqW/N

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks