General

  • Target

    INQUIRY.ACE

  • Size

    574KB

  • Sample

    231011-x9zesaag42

  • MD5

    72749e7307ddf88784007c60950234e4

  • SHA1

    f9936f465942f1f1f2a8bc414d0b531a2bc2e30f

  • SHA256

    c0be416f634cabe2dc88908df4f27383d517083a110504c5a14fd337c0fb8c6c

  • SHA512

    24ddeccc5923bef3dac43cb577b9c81e1ab2a912635ba1c1460be8ce4c4b6ea1664fbe1b4d73f98feb251708f24ef8e3124f353924b8c34a419790ea30b10c70

  • SSDEEP

    12288:G7B3nQr58An3tv9clnHiBtu8xthnKNbkxHaget4YygIpo9rcrqz4t:+pQeA3Y8Btphn8bk/YSG1crP

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      INQUIRY.exe

    • Size

      608KB

    • MD5

      789f2265dfa99a6207f555a5caa4b9d9

    • SHA1

      15e8f77576fc8261c25d45a9ac0d196d4086b711

    • SHA256

      ccee252d64856661eb0ce8ad16565d08ac0013c49e3c386e8011ce1921682d59

    • SHA512

      5229145efacae1a1e907b5d66dc84c42c60b6e45b682f95f1ed7086e8fad1a9ebd90ce8e78ad7e6a2a9d404bf134586ca360cb54ddbd1fba124dd58227a33ad5

    • SSDEEP

      12288:O725hdSZJmFLiuYgZdyTnhJLRXqiWE1xbdp1U9V63jh:t1SZJWbYPnhJRXqMzKV2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks