General

  • Target

    Parking List_1.zip

  • Size

    666KB

  • Sample

    230612-hffcgsbe5s

  • MD5

    4e6a3f02f9f9272596b24967d3db065c

  • SHA1

    aa5511899c3ef379edc32a0becc4bdc0d7a03d86

  • SHA256

    be0f2eb16aeeaa2798242c634a5db4d466014ea41a45ea0f752db9ae7fcedf10

  • SHA512

    78c728ce9f27840666b95912d698b2ebec7bfa8904cbffbca194528bca66ca08e7c042ed714b9dfb9ef77ef19532ee5c39ba8f92a52166c622eb40c9bfadddab

  • SSDEEP

    12288:6a6XdUluyd5ucIJfSOdmGqLR7X7biX+9TLxqb7VUnT7nB9hhrN3GFoMKjWpbVIuq:tfd5eJfXri7LbimXxqdUnTF9jMKjqBID

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Parking List.exe

    • Size

      778KB

    • MD5

      4edc79e7c945539a783aa5b16c171f0d

    • SHA1

      f421c23a1802f51e1239bc65f08b659b96a01d56

    • SHA256

      7680d977b63a749f186c0b526d37b258b7fb76c41e7e535a27e9c435f72b1804

    • SHA512

      d648fc262ebdec6224a7c85a3da88a813492d130d846dcc8b2ee6dd7617512ca985c7ee8bb52511244544cb33ab934b42e48e919bee40cb649b103265d2d8fc3

    • SSDEEP

      24576:GiOV/NOajkQoniHsFLD4992n9mIqAKfvuoEJBdjq:GiOV/NOajk/iHstewn9bqZfnEJBs

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks