General

  • Target

    shipping document.exe

  • Size

    754KB

  • Sample

    230706-qb3afsce4v

  • MD5

    19fe480a0efc03a6d749036c023c0dfe

  • SHA1

    ac140a10cd94d539a22af6ca8ae1cd0aa62ee384

  • SHA256

    876aefee92ee7079d9b36fd7f8a2f236399491f91aac1acd02a6fe9f2e504fc1

  • SHA512

    5f164bf26a0307da02c80ac823646c19c895cf67b4ca8eb3fb5c0cec22d265295c64e4fec50f56dba8fc1f91a1570dacc81d9f4fdbf77c964fbd87553d9cfef2

  • SSDEEP

    12288:Tz6+jhnjh3ncGlsgVet/sVWyIxl9tr7cJh+MIwrU1fn+0yN:Tz1NnNzlsgVe2Kxztr7c+MXIf/y

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      shipping document.exe

    • Size

      754KB

    • MD5

      19fe480a0efc03a6d749036c023c0dfe

    • SHA1

      ac140a10cd94d539a22af6ca8ae1cd0aa62ee384

    • SHA256

      876aefee92ee7079d9b36fd7f8a2f236399491f91aac1acd02a6fe9f2e504fc1

    • SHA512

      5f164bf26a0307da02c80ac823646c19c895cf67b4ca8eb3fb5c0cec22d265295c64e4fec50f56dba8fc1f91a1570dacc81d9f4fdbf77c964fbd87553d9cfef2

    • SSDEEP

      12288:Tz6+jhnjh3ncGlsgVet/sVWyIxl9tr7cJh+MIwrU1fn+0yN:Tz1NnNzlsgVe2Kxztr7c+MXIf/y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks