General

  • Target

    PAYMENT INVOICE.zip

  • Size

    252KB

  • Sample

    230704-g52rcacg9t

  • MD5

    2ed5afd7e698dfac60f8a6886da9fdf3

  • SHA1

    044c97dacfb3cd7e377c36089b86d6192bf5425a

  • SHA256

    7c0c97c4f6c7ebec73406a50d48970b1c9716b1de065f5ffd8916d5530f9dc34

  • SHA512

    f2c92581061c29694a1c1f374e069300c1b742e11a5622038babdfd14c1ce4581970f4b02472bbf7b4db37dfe1a5cf68f9d3f9a001e8af8423258afc1b64c59e

  • SSDEEP

    6144:apU8PLWVVBpGLy5RdpkYl9JF3sVxxi/NguBQCgGBcK7VQYmU:kPLk3/1+Y7JFzNguztjO+

Malware Config

Targets

    • Target

      PAYMENT INVOICE.exe

    • Size

      267KB

    • MD5

      99d771f9122d1277f42dcd7ddcb7721a

    • SHA1

      df3baa87aed177a44fc41592738bedc0cd8173bb

    • SHA256

      7cd2ed629dd0e67f352edcb542ed9ed089b0e474a97701a4036a4c9b08b8f980

    • SHA512

      dcf4eede50c69e1c7aca83e63b5df51d50fe0902afdbb4919472b51a7efe6a9d787ffca24565ece25730a4ed4527264f8ab4010d3372464fc3885d7a01a4dff3

    • SSDEEP

      6144:/Ya6srVVBRGLy5ftpkYljJFxsXxxi/NmeBMCgGBc47VMYm8:/YSrV3Hr+YdJFhNmeDtT2W

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks