General

  • Target

    FILE-23.doc

  • Size

    167KB

  • Sample

    231117-fagbgsfa77

  • MD5

    5b54051c4e44a7aaecbdcbce005a41b0

  • SHA1

    83e1ce5be5080126fe30320270e685f49b99dfc1

  • SHA256

    3c5ebc274e755e8445ad65ef60db518a5c17fa620b4e3036f301d2030d343f54

  • SHA512

    01f141714d024c8bf9917666a410c7b8e9f0c9f5ab11df50d858f50923218c96b06807ebc9d77dab99df4ff17c8d7d5ac3d33ba0802a76eadaa8a5118347764a

  • SSDEEP

    768:7wAbZSibMX9gRWj6SSem273an7sxAGWIHYhvcZZTMDYXqy:7wAlR4Sem23acPWkYhvcwYX9

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      FILE-23.doc

    • Size

      167KB

    • MD5

      5b54051c4e44a7aaecbdcbce005a41b0

    • SHA1

      83e1ce5be5080126fe30320270e685f49b99dfc1

    • SHA256

      3c5ebc274e755e8445ad65ef60db518a5c17fa620b4e3036f301d2030d343f54

    • SHA512

      01f141714d024c8bf9917666a410c7b8e9f0c9f5ab11df50d858f50923218c96b06807ebc9d77dab99df4ff17c8d7d5ac3d33ba0802a76eadaa8a5118347764a

    • SSDEEP

      768:7wAbZSibMX9gRWj6SSem273an7sxAGWIHYhvcZZTMDYXqy:7wAlR4Sem23acPWkYhvcwYX9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks