General

  • Target

    Invoice.doc

  • Size

    147KB

  • Sample

    240424-fajfvafa47

  • MD5

    0c689bc4f98f87cf5e715ef4ce8fa369

  • SHA1

    a0928412605e3689cdd5d2341e3feade0d14863a

  • SHA256

    8f991a169005cfddf782e7e270fadecf63658df01d60823086c3d183e93ecf21

  • SHA512

    1725ce49fcb4815c6c4f326223e8f80a648b0fa97f331cb10e7e0cab704d0543c79fa1ee7930802be89e90d2ebbb923eacc6fbcd33e4327ff501ff3cf49f4503

  • SSDEEP

    1536:pmwAlRkwAlRkwAlRF3IQ/6YrQ5JNEF5+i2O:cwAlawAlawAlH3IW6YrQ5JNEF5+i2O

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Invoice.doc

    • Size

      147KB

    • MD5

      0c689bc4f98f87cf5e715ef4ce8fa369

    • SHA1

      a0928412605e3689cdd5d2341e3feade0d14863a

    • SHA256

      8f991a169005cfddf782e7e270fadecf63658df01d60823086c3d183e93ecf21

    • SHA512

      1725ce49fcb4815c6c4f326223e8f80a648b0fa97f331cb10e7e0cab704d0543c79fa1ee7930802be89e90d2ebbb923eacc6fbcd33e4327ff501ff3cf49f4503

    • SSDEEP

      1536:pmwAlRkwAlRkwAlRF3IQ/6YrQ5JNEF5+i2O:cwAlawAlawAlH3IW6YrQ5JNEF5+i2O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks