General

  • Target

    New Order 3118.doc

  • Size

    1.7MB

  • Sample

    240328-hzym6sfb9w

  • MD5

    7a24b565d557e96657a019e0c1b93865

  • SHA1

    b760ac2545af0df54ca335d18fa2df4280646881

  • SHA256

    d9c01464eccdd1f866bca7505ea879e1f8f54a151aa3c4cab946bbc99e1e46bb

  • SHA512

    051bc3b130367e113dd7c07579d4c9a9d5ea71f71ba4dd412e25e69fa54dc03f324150dcb88eeda4405562b5232b8bc9fa25826ee7cb2aa477e2591a2f17fdf5

  • SSDEEP

    24576:oiu8COb31WA6cg4Y2YkSAWeyPIplPzEwWuPRaWnAtTZDTaMB0W1Ln7QiMZLKmVwH:Q

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gosportz.in
  • Port:
    587
  • Username:
    sales@gosportz.in
  • Password:
    Ss@gosportz
  • Email To:
    info.superseal@yandex.com

Targets

    • Target

      New Order 3118.doc

    • Size

      1.7MB

    • MD5

      7a24b565d557e96657a019e0c1b93865

    • SHA1

      b760ac2545af0df54ca335d18fa2df4280646881

    • SHA256

      d9c01464eccdd1f866bca7505ea879e1f8f54a151aa3c4cab946bbc99e1e46bb

    • SHA512

      051bc3b130367e113dd7c07579d4c9a9d5ea71f71ba4dd412e25e69fa54dc03f324150dcb88eeda4405562b5232b8bc9fa25826ee7cb2aa477e2591a2f17fdf5

    • SSDEEP

      24576:oiu8COb31WA6cg4Y2YkSAWeyPIplPzEwWuPRaWnAtTZDTaMB0W1Ln7QiMZLKmVwH:Q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks