General

  • Target

    RFQ.xls

  • Size

    317KB

  • Sample

    240311-qyjrmagb63

  • MD5

    5a54c634aafe8f429437854c349f0d53

  • SHA1

    561859535231c8d09b33fcea4485829db1e96c7d

  • SHA256

    403cba077fb06d93f68158de86d15d1dcd3d51e5bf7b7457bfdce5c13c1c07ab

  • SHA512

    ab6193366cd9134820462bc69a2eb3f632ed8f8c7fb32587d54caed572cf671c119a873f2b921efc5bc7f883258bad9aa92395bf99f6dc5bad33434ee6d9bf53

  • SSDEEP

    6144:HsunJ2oY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVyGMIvzUwDNOQ46862f7L:HlJ2l3bVyGMIvgwZOQoJuIAm

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      RFQ.xls

    • Size

      317KB

    • MD5

      5a54c634aafe8f429437854c349f0d53

    • SHA1

      561859535231c8d09b33fcea4485829db1e96c7d

    • SHA256

      403cba077fb06d93f68158de86d15d1dcd3d51e5bf7b7457bfdce5c13c1c07ab

    • SHA512

      ab6193366cd9134820462bc69a2eb3f632ed8f8c7fb32587d54caed572cf671c119a873f2b921efc5bc7f883258bad9aa92395bf99f6dc5bad33434ee6d9bf53

    • SSDEEP

      6144:HsunJ2oY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVyGMIvzUwDNOQ46862f7L:HlJ2l3bVyGMIvgwZOQoJuIAm

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks