General

  • Target

    Quotation-V-40795 FOR RINNO ALUMINUM CO., LTD.docx

  • Size

    10KB

  • Sample

    230724-kner2acd4x

  • MD5

    e58dcebb5aaf40ef0adaadc9818f030d

  • SHA1

    aa2509ad48483a94813650d34ae46e43dce5db84

  • SHA256

    40eb0b8e3b99e28ca328e297048cee183a647c9d61d38c3f44979bc014e23146

  • SHA512

    297cd6f08e6167e39639e39611625d27b5b5ebf35d382c360b6e4a68f5aee5e04ce6b38970c6cfd9a6247e6ed534e08a526915fe1afd65bc1eb35e1f3c87217e

  • SSDEEP

    192:Iya0NTrOLW2ARgZVPCK44AG9xXSJ+Ej70JYSKwNKh2wWYAcWeUtac:IyXTrOLW2ANK4499xXSJf70JYSEaYA6c

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Quotation-V-40795 FOR RINNO ALUMINUM CO., LTD.docx

    • Size

      10KB

    • MD5

      e58dcebb5aaf40ef0adaadc9818f030d

    • SHA1

      aa2509ad48483a94813650d34ae46e43dce5db84

    • SHA256

      40eb0b8e3b99e28ca328e297048cee183a647c9d61d38c3f44979bc014e23146

    • SHA512

      297cd6f08e6167e39639e39611625d27b5b5ebf35d382c360b6e4a68f5aee5e04ce6b38970c6cfd9a6247e6ed534e08a526915fe1afd65bc1eb35e1f3c87217e

    • SSDEEP

      192:Iya0NTrOLW2ARgZVPCK44AG9xXSJ+Ej70JYSKwNKh2wWYAcWeUtac:IyXTrOLW2ANK4499xXSJf70JYSEaYA6c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks