General

  • Target

    soa-zip.exe

  • Size

    641KB

  • Sample

    231012-qfpj6abd3v

  • MD5

    12e015f7ce3f2092a290eccf26de6889

  • SHA1

    8df07f8196034f78c49c737755d57363dc146842

  • SHA256

    475adab8c1638c6f1c930d1a6e9715f7728052fb76407c5393b24adc2884c3f1

  • SHA512

    865edc506f7567f1ffbd02df36bc83bcc78fe16187441ad4e8b78761e3be15c5ff9a81e27f51029913d4addbf6833b377df27dbea9cdec5eee00c2b6e9421219

  • SSDEEP

    12288:Hvoz2iOzzwDFdOZahdrR3VnkOwDlLP8GEL1emviGqcu6QgKP3+SBV435B:HvozJqAFdpf1VnWR8GjEi2RkPVBVY/

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      soa-zip.exe

    • Size

      641KB

    • MD5

      12e015f7ce3f2092a290eccf26de6889

    • SHA1

      8df07f8196034f78c49c737755d57363dc146842

    • SHA256

      475adab8c1638c6f1c930d1a6e9715f7728052fb76407c5393b24adc2884c3f1

    • SHA512

      865edc506f7567f1ffbd02df36bc83bcc78fe16187441ad4e8b78761e3be15c5ff9a81e27f51029913d4addbf6833b377df27dbea9cdec5eee00c2b6e9421219

    • SSDEEP

      12288:Hvoz2iOzzwDFdOZahdrR3VnkOwDlLP8GEL1emviGqcu6QgKP3+SBV435B:HvozJqAFdpf1VnWR8GjEi2RkPVBVY/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks