Resubmissions

31-05-2023 09:14

230531-k7j6vsdh69 10

31-05-2023 08:51

230531-kscs8sdh27 10

General

  • Target

    PURCHASE ORDER.exe

  • Size

    980.7MB

  • Sample

    230531-kscs8sdh27

  • MD5

    bd703b78deb5f77d1d63d971d34fae6a

  • SHA1

    df8767084e486adcad0cb810f5f8c0c8c6af8e08

  • SHA256

    5dd5fd62ad29bafab6dcb00d0cf996bc98ab86f688f249298b325574b127768d

  • SHA512

    f23a39f437a2b608c6e502456de533478b8a2dcd9a6c545ad822044cc60f6b3b4fab783a599d5b38ad949944adb7b1688c176d826a0e3847e529e1b5907d44a7

  • SSDEEP

    12288:AjAMTihh6xhZ6OrOLY5iZpvlrVq2Tx/dsZk8pscJm3P678HhhNktvR5u:HMUgh8y44yFlQsC28428BhqR5u

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6019964522:AAF4GL7tiulCBCd_CdLMmgPQ-2YhOYdHGMo/

Targets

    • Target

      PURCHASE ORDER.exe

    • Size

      980.7MB

    • MD5

      bd703b78deb5f77d1d63d971d34fae6a

    • SHA1

      df8767084e486adcad0cb810f5f8c0c8c6af8e08

    • SHA256

      5dd5fd62ad29bafab6dcb00d0cf996bc98ab86f688f249298b325574b127768d

    • SHA512

      f23a39f437a2b608c6e502456de533478b8a2dcd9a6c545ad822044cc60f6b3b4fab783a599d5b38ad949944adb7b1688c176d826a0e3847e529e1b5907d44a7

    • SSDEEP

      12288:AjAMTihh6xhZ6OrOLY5iZpvlrVq2Tx/dsZk8pscJm3P678HhhNktvR5u:HMUgh8y44yFlQsC28428BhqR5u

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks