General

  • Target

    PURCHASE ORDER.zip

  • Size

    256KB

  • Sample

    230703-lc2m4aha9x

  • MD5

    423cd5b549c2872857367db133b960a4

  • SHA1

    96d1786135463ac8342694cf617d6b34612b0266

  • SHA256

    f9f83c3846cb77a82a67e231f5d770d805f486cf602798b3d4d4444255bb87ef

  • SHA512

    59e68b0d9e036330d881477335d374ea0687926159004603899ca4baa52d61cde5c0f9a1700dd27d9ab640f80f226b70a7aa4c1dec927cdc9cf61535692a21d4

  • SSDEEP

    6144:lpU8PLxNSraik7I/knzPvRPMwrmqFb3P7c1lb0mf3aD47:7PLxNE3lsnTRPMwrmqV3DUlAOaM

Malware Config

Targets

    • Target

      PURCHASE ORDER.exe

    • Size

      271KB

    • MD5

      664fc03c56695b1fe1cfa34159cc36dd

    • SHA1

      f9dd1ebc4f3d60c7c7400c8d1b67164a0e3f98a2

    • SHA256

      156c6d57b228e6b5a8920f268f26b70b5fb6ec53b255f102f2dc9f7fa21c9097

    • SHA512

      b52a6332e7abf43747ea2aa64173efeecbf7bcae3935e56563d949c12bef50f2b7d75a30a8147bdcaa676e945ccb31e04dc89fe1c736d92a77588540834709f9

    • SSDEEP

      6144:vYa6coraik7e/kTz9pRPAwpm4Fb3P7c9Vb0mH3a64x:vYa63JsTvRPAwpm4V3DSVA8aR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks