General

  • Target

    2.docx

  • Size

    16KB

  • Sample

    231127-n7wfnsgd47

  • MD5

    74a1be4072cdff7d23292d65ad2112a3

  • SHA1

    2df97ec0e50130b764d5b777a328da4ce5ba49d9

  • SHA256

    5ce58c49f5abc817c193a24964f2abb75db9caafe37d3901cba27cadb872e0a8

  • SHA512

    0fea42e33b8a3e3c56a1a0b570f3f087c901e1e5e4a6a93b34610bfe4c07808bb0cbab6ee543192cf21189f57b823edf01112812fec6b791005333e0ab475287

  • SSDEEP

    384:uyXfh2hWqs8PL8wi4OEwH8TIbE91r2fRaJYdviiHI5//r:ucfKR5P3DOqnYJEMvXHI5/T

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      2.docx

    • Size

      16KB

    • MD5

      74a1be4072cdff7d23292d65ad2112a3

    • SHA1

      2df97ec0e50130b764d5b777a328da4ce5ba49d9

    • SHA256

      5ce58c49f5abc817c193a24964f2abb75db9caafe37d3901cba27cadb872e0a8

    • SHA512

      0fea42e33b8a3e3c56a1a0b570f3f087c901e1e5e4a6a93b34610bfe4c07808bb0cbab6ee543192cf21189f57b823edf01112812fec6b791005333e0ab475287

    • SSDEEP

      384:uyXfh2hWqs8PL8wi4OEwH8TIbE91r2fRaJYdviiHI5//r:ucfKR5P3DOqnYJEMvXHI5/T

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks