General

  • Target

    TT USD6780.xls

  • Size

    317KB

  • Sample

    240311-v7p28abf67

  • MD5

    c890a287cfe77ff099940ee470a85e6e

  • SHA1

    2cf1ddc5c8d92494c9562a990ac9a2c013ac21ef

  • SHA256

    55abb276600e4782360ea97c0fcf47c12944bf09a22df6d923d9d6edb40b26bc

  • SHA512

    e2d36012debd50ce713266a61adf8bd9a69be8570827fe48c38b184d55c56de6629a7db713eca9b80b8e0f19da3d51e12631724e9e80ee3ea77c0040c044b6db

  • SSDEEP

    6144:SVunJ6cY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbV5UMIYAaB5YSNcXwQDDgJ:S4J6x3bV5UMIaB6SNcVDgmhe/TxWe4O

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      TT USD6780.xls

    • Size

      317KB

    • MD5

      c890a287cfe77ff099940ee470a85e6e

    • SHA1

      2cf1ddc5c8d92494c9562a990ac9a2c013ac21ef

    • SHA256

      55abb276600e4782360ea97c0fcf47c12944bf09a22df6d923d9d6edb40b26bc

    • SHA512

      e2d36012debd50ce713266a61adf8bd9a69be8570827fe48c38b184d55c56de6629a7db713eca9b80b8e0f19da3d51e12631724e9e80ee3ea77c0040c044b6db

    • SSDEEP

      6144:SVunJ6cY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbV5UMIYAaB5YSNcXwQDDgJ:S4J6x3bV5UMIaB6SNcVDgmhe/TxWe4O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks