General

  • Target

    New Order 3118.rtf

  • Size

    3KB

  • Sample

    240326-xbrbhshb97

  • MD5

    99a565b1df705062e82bd4d7587c2959

  • SHA1

    1817b3ef54cf96f71bbb581ef21c37c820c125f0

  • SHA256

    e8fac55896700a6e6505cc1b8d4f98570358c0a1275564d587845cfb5ec47068

  • SHA512

    6893bb6540e7c92cb2d39dae83dd7e16a5ed0cc8bc468e13d65dc1a4e5b909bc9a249b306323167a986ee199b6ff6a9d444b673028e4b92aeb9b0b62607ed15c

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      New Order 3118.rtf

    • Size

      3KB

    • MD5

      99a565b1df705062e82bd4d7587c2959

    • SHA1

      1817b3ef54cf96f71bbb581ef21c37c820c125f0

    • SHA256

      e8fac55896700a6e6505cc1b8d4f98570358c0a1275564d587845cfb5ec47068

    • SHA512

      6893bb6540e7c92cb2d39dae83dd7e16a5ed0cc8bc468e13d65dc1a4e5b909bc9a249b306323167a986ee199b6ff6a9d444b673028e4b92aeb9b0b62607ed15c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks