General

  • Target

    3f2af84e80e688ad910f1ff1cf39eba5575ef4f2c89e1e8aec5923f808836da6.rar

  • Size

    657KB

  • Sample

    240228-t4a88age3t

  • MD5

    bc763018271c0f091616d977b6636d7a

  • SHA1

    b04c6cf3b52ba3bd598857f95aca0687c65e2ab1

  • SHA256

    3f2af84e80e688ad910f1ff1cf39eba5575ef4f2c89e1e8aec5923f808836da6

  • SHA512

    754aa9d57ef049aeb5051bae666b1fc7d6a7d77ff1e18b811e4fe306d796884f296614e6e73fc99b710833e7bd5eed1ca53c259a012153e33a6f9856cefc94e2

  • SSDEEP

    12288:yv0xESR/ZweolPji+GUZy2Z5f44qlxsBRF8ZMzs5q0atgLaPsLV:XCAhRsj44+ivOZM49+PsZ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.amtechprinting.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    7DIK+y&7]WOK

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.amtechprinting.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    7DIK+y&7]WOK

Targets

    • Target

      Amended Order #60-23095847001XXX024.exe

    • Size

      694KB

    • MD5

      65fc516dfcbb346c2a430dc6709adc5d

    • SHA1

      20d5763dd261d2d1e2bbd37174edeaf4c74b6787

    • SHA256

      6bc7fd6f54de2d3e47e6e0fe471683c39f12a766a527a7c1ed80b687cd3b747a

    • SHA512

      3d9c25ecdd58976f3f2754a3ac5b2942e5bb75a4b352cff4c0964be73d8c43fed7057504061ff6f97afd456e6ac27e33de734b2e84549050438e631f9733f262

    • SSDEEP

      12288:LOzScV3vr96xCUb927gFffZVNmNmg0kKd37zMFCHr+KNuhz:yzSOG8y5VNmNV0kKZMyeh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks