General

  • Target

    Inquire Equipment.zip

  • Size

    503KB

  • Sample

    230606-p9t63aec4w

  • MD5

    4ff2c75a805508f549e85287625ca017

  • SHA1

    695bd852f3c4bdebf4577ee5ca54ee97d45dd8b9

  • SHA256

    642a1f48d9c5ace4260f08821553444d060d0ad1511220f08cbafca2c6e81ae6

  • SHA512

    1268c72dbea61231abca379883b2dec17bbd3bb584c5c172f2ca018a15635c782b6b84e9305512035c5ddf3792812ce1922637220329d4e61bd26ebdb88fabf6

  • SSDEEP

    12288:tvGjPbtyW1R1PFPMywm0Hbu1jzjqhpD0cCdY:8DJ3wm6uPE909Y

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Inquire Equipment.exe

    • Size

      681KB

    • MD5

      3af21ee8bbf17d53967dd7005dcc4e4a

    • SHA1

      20a33dd2e3417eb675df67f83472e5bfa95739df

    • SHA256

      fb36ca37495933a6fdd5da7db3dc63e1eba950c54a2626e7fbcf520118a0b09e

    • SHA512

      dccde976ae09d8f8321b01c5cd88f29889151f412f74f9578b9811dd47c387832e52b5c4e1f9ff54c43534b58b651c5ec5a66a8ac2d176408ffbd4a3e837a91f

    • SSDEEP

      12288:G21+j8JX0hQY11xjzKsNnsi/8EwGuoHJY:G2Ej8JUZ1hGQsk9wpmY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks