General

  • Target

    Order_confirmation#7682712.exe.bin

  • Size

    404KB

  • Sample

    230501-yl9raaaa21

  • MD5

    bd43373032914b158e1c011251f7402b

  • SHA1

    849d897908340069afadb1ca61bc8a9bbb1f18b1

  • SHA256

    accc20bc6b2bb01f68c7790e0c5a3a62bc30f8366fb6db99a2315a42a8ed7b2b

  • SHA512

    5eb9762735626bfb754eee7ebe7d28dad1f9351174d08dc41b150bfb075d405a79bd688c7b2b235902bc0dfb6ee9de36d06d720e38a236d94bed6b5d6e59bd3f

  • SSDEEP

    6144:y5eTTxmv95jyNv0qqSsT1OjM/skojeLNMEq8rODSzqjs9OR:yETTxmVpyNUlT8j2oSdq8Cwus9

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Order_confirmation#7682712.exe.bin

    • Size

      404KB

    • MD5

      bd43373032914b158e1c011251f7402b

    • SHA1

      849d897908340069afadb1ca61bc8a9bbb1f18b1

    • SHA256

      accc20bc6b2bb01f68c7790e0c5a3a62bc30f8366fb6db99a2315a42a8ed7b2b

    • SHA512

      5eb9762735626bfb754eee7ebe7d28dad1f9351174d08dc41b150bfb075d405a79bd688c7b2b235902bc0dfb6ee9de36d06d720e38a236d94bed6b5d6e59bd3f

    • SSDEEP

      6144:y5eTTxmv95jyNv0qqSsT1OjM/skojeLNMEq8rODSzqjs9OR:yETTxmVpyNUlT8j2oSdq8Cwus9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks