General

  • Target

    Maersk BL 208268807.exe

  • Size

    1.1MB

  • Sample

    230614-fnjzjada95

  • MD5

    389b1ceb54ef9b29abd411ecc34a81e3

  • SHA1

    10d1d0b6079b473cbc2f80fae531c5249d869b10

  • SHA256

    57191284c75940f3a637266acc38d3a503ab97a52c9d99a0a85ff61d27420b6f

  • SHA512

    fbdd56931a513a22eb7bea4f520b7cdcfc15b9b7b2035783be27dc4d200c4de0ea92b4529372dbb89153f3869dcb07366a9485c932e1d75ef542461bad61df19

  • SSDEEP

    24576:x9g5RKfkbB7XrwQVAv4OagvtRejXSWfJ:Q5R5BXEQ+4OagKfJ

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1633482536:AAF1JIS_DaayovuRrLGy_POYaI3DRc2CrPY/sendDocument

Targets

    • Target

      Maersk BL 208268807.exe

    • Size

      1.1MB

    • MD5

      389b1ceb54ef9b29abd411ecc34a81e3

    • SHA1

      10d1d0b6079b473cbc2f80fae531c5249d869b10

    • SHA256

      57191284c75940f3a637266acc38d3a503ab97a52c9d99a0a85ff61d27420b6f

    • SHA512

      fbdd56931a513a22eb7bea4f520b7cdcfc15b9b7b2035783be27dc4d200c4de0ea92b4529372dbb89153f3869dcb07366a9485c932e1d75ef542461bad61df19

    • SSDEEP

      24576:x9g5RKfkbB7XrwQVAv4OagvtRejXSWfJ:Q5R5BXEQ+4OagKfJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks