General

  • Target

    Contract Invoice document.zip

  • Size

    551KB

  • Sample

    230605-tmc2gsaa8y

  • MD5

    32b849ed199ed0ae0c42e23fa5337436

  • SHA1

    6aedc337d66725a768124d9b088b050f138fe2b7

  • SHA256

    1ba78ff4aad674810f2bd6bd9d0153d4b22423601805cf0beb1d198a05d6c0d9

  • SHA512

    68b28b86e45dbafe7adad003c50a8d3b36516be9b1fd9677c04a5a8fad6c039d125b6f1d9f14158fd1bd29728efb662380170b3e8afe935ea314dbf99a308db3

  • SSDEEP

    12288:Z+MzwULHygZjYRH9Kb5Fq6W20kMnB3af5TmL5YCpkIHx8:ZpztERQO6en4fM71HS

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Contract Invoice document.exe

    • Size

      700KB

    • MD5

      2d7ed81d34091273b1538759705ac990

    • SHA1

      465b350600a5561ad892e259f81ff2aa065e2b76

    • SHA256

      82ff0a181a498c9a794c085821aeec269122f36c222dfcf31ea39d71d6b4c9f9

    • SHA512

      1d3335f0170b993c6e96e3181937d7f12adb0f12bb2560b20f2c7a29097cb21b9a507a8c2f9e07a4f466f2b115098e37c00866cc8cc807e978072066e5b3be92

    • SSDEEP

      12288:AvV+s1bSQT6tjjdB408SwuqM9Scx/zChU7z0p2XhIK137I5m1OXGI4j5s:AtHRuJoY/ehU30kh37/Au

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks