General

  • Target

    Invoice #765400.rar

  • Size

    664KB

  • Sample

    231013-rfr6qaad2w

  • MD5

    fd56eba296bcac1351c1752f412c971d

  • SHA1

    578dec0533b5c2f7450619b9372e0cb6702d238a

  • SHA256

    ae4237ed1856e85fbb153facdf9aec4bbec7e4d32bd3f22628129b886fb44acb

  • SHA512

    5650b9a38046c7d872e9c6d9f2e5be837844412928cd1627c9d4d053557764a567a1e7e169120338c8b919503d8259a6d401b54761a187e309d69e2500dc556f

  • SSDEEP

    12288:AMURXc5wGk0RiycbyCtjuqsdCF4Qg3QI3gBrqSCPwQDAhqY45qqtI1wThMq3wXy+:AMUtciGzcbbtjuzIF4QgQjZqdPwQDAw4

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Invoice #765400.exe

    • Size

      1.2MB

    • MD5

      8c7184463be150691489096717df0e38

    • SHA1

      e5247c85b2735cece7b114db445ac7b98739b333

    • SHA256

      657cc831fe3eeaafccde4fe707832b998b699b1e7b525bc2d2fbcb5bbe3c7cd7

    • SHA512

      da58cb6e056d4c692b72115c3e8fe334816ad507e743f04824177bc8d0e55afdcf06ace2cf7a1190bd7b1f608a2600f7f18f4ee9f17a783205914033503c2fe5

    • SSDEEP

      12288:jFSMy5IBGtmQLZ91uk9v7JbGEYQMGhLHnvzxIwvmm2ieWpBxxw:JSMGTbxZQZGhLHvzxImHTz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks