General

  • Target

    DHL-AWB 4567832.exe

  • Size

    619KB

  • Sample

    230421-gjlg8sgc5x

  • MD5

    0c491eef53689920bef1358cfed585dc

  • SHA1

    e22618a8c9c535e6e6b8ca2162dcffb8c011ec91

  • SHA256

    504a27b4efe9db79bb0ac1fd1a3258d6b94c7989e4b4b892e587e40d6dd4dd02

  • SHA512

    3e1e02a8162460a8e7896de5afc590eb5db170df08f191b899e6ba9d96290acb6dc7982024f0f2e8bbe8a73038b4ca5d3a0cac0033fa9b1081cf690ddb76ba19

  • SSDEEP

    12288:MFWp0GXYz7kR1frcYc6d59mV3WbkiAqtpZmQeso1QH:M4p0GI+foYch3R8U3so1QH

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5635409590:AAHInAR4dWLcsUes3TU8Nj2UQrEubKrXKLs/

Targets

    • Target

      DHL-AWB 4567832.exe

    • Size

      619KB

    • MD5

      0c491eef53689920bef1358cfed585dc

    • SHA1

      e22618a8c9c535e6e6b8ca2162dcffb8c011ec91

    • SHA256

      504a27b4efe9db79bb0ac1fd1a3258d6b94c7989e4b4b892e587e40d6dd4dd02

    • SHA512

      3e1e02a8162460a8e7896de5afc590eb5db170df08f191b899e6ba9d96290acb6dc7982024f0f2e8bbe8a73038b4ca5d3a0cac0033fa9b1081cf690ddb76ba19

    • SSDEEP

      12288:MFWp0GXYz7kR1frcYc6d59mV3WbkiAqtpZmQeso1QH:M4p0GI+foYch3R8U3so1QH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks