General

  • Target

    e8fac55896700a6e6505cc1b8d4f98570358c0a1275564d587845cfb5ec47068.rtf

  • Size

    3KB

  • Sample

    240327-c8w8taba34

  • MD5

    99a565b1df705062e82bd4d7587c2959

  • SHA1

    1817b3ef54cf96f71bbb581ef21c37c820c125f0

  • SHA256

    e8fac55896700a6e6505cc1b8d4f98570358c0a1275564d587845cfb5ec47068

  • SHA512

    6893bb6540e7c92cb2d39dae83dd7e16a5ed0cc8bc468e13d65dc1a4e5b909bc9a249b306323167a986ee199b6ff6a9d444b673028e4b92aeb9b0b62607ed15c

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      e8fac55896700a6e6505cc1b8d4f98570358c0a1275564d587845cfb5ec47068.rtf

    • Size

      3KB

    • MD5

      99a565b1df705062e82bd4d7587c2959

    • SHA1

      1817b3ef54cf96f71bbb581ef21c37c820c125f0

    • SHA256

      e8fac55896700a6e6505cc1b8d4f98570358c0a1275564d587845cfb5ec47068

    • SHA512

      6893bb6540e7c92cb2d39dae83dd7e16a5ed0cc8bc468e13d65dc1a4e5b909bc9a249b306323167a986ee199b6ff6a9d444b673028e4b92aeb9b0b62607ed15c

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables packed with or use KoiVM

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks