General

  • Target

    purchase order (2).exe

  • Size

    743KB

  • Sample

    230615-y6pa3sah8t

  • MD5

    974fe07d20f86b749e611480053d9a61

  • SHA1

    d5c39fffb6cccae4dd6dc18c7044a96fb7d4506a

  • SHA256

    f3272c1d83abe1c34e604d47d8e7994fc9b9d9914606fe0499fd2feef07cd1cb

  • SHA512

    54e91fd5b813076514b73b2415ebbe269549cccc3a458ae318ab06676abc2bcc74276011e903258bd3fc3bf7c216c5a140cb013ccb9ca7d6c97d4b9c1d7f0bbe

  • SSDEEP

    12288:HM2iNyOe42KMu/N3mWhQmwmJCMpUlOwr1v8+7VfK0AKV6sUj7sMl9vNpyws1KNS2:s1wOV/NOaOOwr1v8yVfKrg6sUjQsZeKZ

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6118510930:AAGLmjz14DOBPW-OuVj-xMJhmBoGJAqv5to/

Targets

    • Target

      purchase order (2).exe

    • Size

      743KB

    • MD5

      974fe07d20f86b749e611480053d9a61

    • SHA1

      d5c39fffb6cccae4dd6dc18c7044a96fb7d4506a

    • SHA256

      f3272c1d83abe1c34e604d47d8e7994fc9b9d9914606fe0499fd2feef07cd1cb

    • SHA512

      54e91fd5b813076514b73b2415ebbe269549cccc3a458ae318ab06676abc2bcc74276011e903258bd3fc3bf7c216c5a140cb013ccb9ca7d6c97d4b9c1d7f0bbe

    • SSDEEP

      12288:HM2iNyOe42KMu/N3mWhQmwmJCMpUlOwr1v8+7VfK0AKV6sUj7sMl9vNpyws1KNS2:s1wOV/NOaOOwr1v8yVfKrg6sUjQsZeKZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks