General

  • Target

    14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73

  • Size

    267KB

  • Sample

    230518-qzd8jabb77

  • MD5

    f59e8520a25e69615b1ff73210a55bf3

  • SHA1

    a060923f0d58b80862bc5cc430ca7d1031f2d40d

  • SHA256

    14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73

  • SHA512

    b6d2df5a3d69763ff0892078ee6b7a96faefff96b9775b297c1bcc452ade8f71d87ebef6cae5e486e583ae9b11154f755475317ada32ff34cffedcd49879f4e0

  • SSDEEP

    6144:vYa6sjKHfwLAECjart8bp7EV1V6kzWjizOUb7uCkVzvNY:vYqjYfiCWpG4HVDpkVzvNY

Malware Config

Targets

    • Target

      14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73

    • Size

      267KB

    • MD5

      f59e8520a25e69615b1ff73210a55bf3

    • SHA1

      a060923f0d58b80862bc5cc430ca7d1031f2d40d

    • SHA256

      14d465836d5f7bbdf0a769e8dec53c1a604dae8dd188b83c8e3e39133c420d73

    • SHA512

      b6d2df5a3d69763ff0892078ee6b7a96faefff96b9775b297c1bcc452ade8f71d87ebef6cae5e486e583ae9b11154f755475317ada32ff34cffedcd49879f4e0

    • SSDEEP

      6144:vYa6sjKHfwLAECjart8bp7EV1V6kzWjizOUb7uCkVzvNY:vYqjYfiCWpG4HVDpkVzvNY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks