Resubmissions

19-07-2023 16:25

230719-tw2ffahg49 10

19-07-2023 14:47

230719-r5vyxagh75 3

General

  • Target

    ENTIRE_MESSAGE

  • Size

    626KB

  • Sample

    230719-tw2ffahg49

  • MD5

    e48796bce07474a247555e0215d18e46

  • SHA1

    e2f3c099953418188848ca17e4ddb667a84461e5

  • SHA256

    0220e410d24938b8ed9455fc059a80530bd658d75ead27a02388f4d5639ce163

  • SHA512

    05c5098b2813a73fe4d1b3a4df70d52a296b7a150c056d0256ee2d9bb967ba4ca1e02ebd74d825abae980b0dc72201048d1e9dfe6b58ac19f3622beed9f91a30

  • SSDEEP

    12288:h9NhtdL9sWokPPd0tc36rt567QO1po7sRv816MmgJTouOizvu5Vp7wbxgqL0:h3ndL9P10a6ra79boUU1igJoVSKyx10

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Scanned_CORRECTION-AMENDMENTS EFFECTED_SHIPMENT DOCUMENTS Tuticorin MV GRACE.exe

    • Size

      645KB

    • MD5

      d8129bf1f1731a8d7c2e4c951df120da

    • SHA1

      35bc216b4b5c27f8b499cf985e56df5400d1252a

    • SHA256

      fd80a61471b89fd67b5c966308c329fde1c6e70b0c229ac77d3407ca612090da

    • SHA512

      dfb69df21cb6ff5047e888aca6e9bd78aaaf43c9d253d913dfd8784d9ebc20dec69d438a09284e6b57b4200373b27b22050b6fdc621c348061319d3596e2d6f9

    • SSDEEP

      12288:qf7mKpal5XpclyG2C2sFZh+HHp0j/sqi+BvIs5:qDc5XpoV3rgu/os

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks