General

  • Target

    ORDERS.zip

  • Size

    678KB

  • Sample

    230829-skg2zsgc4w

  • MD5

    117a5d382e9213355493bec05e49d218

  • SHA1

    ea862ed0b4f37dec1505e47b58abb3601b31c287

  • SHA256

    294df2fa74ab3b8907d096dafedac05200cc82c725fe3b8b4b78642aad013ec0

  • SHA512

    f2b85d678b3cef3c7758038b2337ec4953103642b22c3af8c50f04f300b21a78f5dcf915f0cd4fa4ae8298466705ab64b0900898aacaa3980811db94a3324ad0

  • SSDEEP

    12288:NptcrdhNzT/rzZrpbRv0lENqYzhApVQZ8bogX6j/vpRxx07DR1HfBoRpm06:hcrV7FrpbRv0lEYKQa8b1cvw7DHBEp96

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      kTg1jSEh7699WIj.exe

    • Size

      711KB

    • MD5

      85e8c0d50d714e0e0102724f2abe9965

    • SHA1

      a0b8e27c0e6e905cc34c62f39a544973d7b17a7e

    • SHA256

      d80553d0154e6796beb27196164a28db62c57be2fc5033678d08510da2bfb732

    • SHA512

      5ce6713dab212c22170dce6751672b3c73f3ee3cc06dff24b74efe7e0f8ca96c88b7f5b44a405a6f80df536347c3da51460a7a05f88199ac592b7021e531e1a1

    • SSDEEP

      12288:V0dC0hj45NEd5KAhjwUNNOlElUYzhAV7QZ8boQX6/0qCYpEPNoaHmoN+F:V0QSjuNEd5KoulEmKWY8bLe0spkoZ6+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks