General

  • Target

    FILE-2378.doc

  • Size

    171KB

  • Sample

    231116-yvyelsfb89

  • MD5

    227657a3dbaa093c847d8eb8b3adaf99

  • SHA1

    cafd0627f276f77bd9432a532598e6df3caa4b9b

  • SHA256

    13569d8241fb4788f0e4f1199f91c9f324929e783cfe93c51ead94a185b1cac7

  • SHA512

    997f1519299df2a170a073c3f5a85799a01623e17d21fc519bbb3fa7f277be65f01d91796126877759742d8ceec8187542cb0fd8bbc746cfa8b24946d51b7000

  • SSDEEP

    768:nDwAbZSibMX9gRWjQBDE22mucyBYWW7lo7LlsadDOTqq2QzImFj5:DwAlRREXhHO76v+AvwzJ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      FILE-2378.doc

    • Size

      171KB

    • MD5

      227657a3dbaa093c847d8eb8b3adaf99

    • SHA1

      cafd0627f276f77bd9432a532598e6df3caa4b9b

    • SHA256

      13569d8241fb4788f0e4f1199f91c9f324929e783cfe93c51ead94a185b1cac7

    • SHA512

      997f1519299df2a170a073c3f5a85799a01623e17d21fc519bbb3fa7f277be65f01d91796126877759742d8ceec8187542cb0fd8bbc746cfa8b24946d51b7000

    • SSDEEP

      768:nDwAbZSibMX9gRWjQBDE22mucyBYWW7lo7LlsadDOTqq2QzImFj5:DwAlRREXhHO76v+AvwzJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks