General

  • Target

    Req No.4800011619_Ruwais Ref_Rev.exe

  • Size

    339KB

  • Sample

    240430-dhe3aaaf39

  • MD5

    6810b95a59510282c1f101d5240424dc

  • SHA1

    5a7eda4e7a6ec55b93a01fe33d7cf2110d866e2e

  • SHA256

    2a56c19b0b67c670757a44c11aae0d2c19693b2e785baac2be04547c017fb468

  • SHA512

    2846c3bacce257ad876f4b537a2158c7ae85cf1ded241adda171b8298a0b3717bf5ab69ed09dab5c8c387fe589f631104d15a6f55974e0fd001ddac55bb89d1c

  • SSDEEP

    6144:EYa6EIIIIBDs7abWsY5VBJu6tEjQb61e1hKH+uGwct0:EYCw+bWsYJt4+hexGw9

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Req No.4800011619_Ruwais Ref_Rev.exe

    • Size

      339KB

    • MD5

      6810b95a59510282c1f101d5240424dc

    • SHA1

      5a7eda4e7a6ec55b93a01fe33d7cf2110d866e2e

    • SHA256

      2a56c19b0b67c670757a44c11aae0d2c19693b2e785baac2be04547c017fb468

    • SHA512

      2846c3bacce257ad876f4b537a2158c7ae85cf1ded241adda171b8298a0b3717bf5ab69ed09dab5c8c387fe589f631104d15a6f55974e0fd001ddac55bb89d1c

    • SSDEEP

      6144:EYa6EIIIIBDs7abWsY5VBJu6tEjQb61e1hKH+uGwct0:EYCw+bWsYJt4+hexGw9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      cff85c549d536f651d4fb8387f1976f2

    • SHA1

      d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    • SHA256

      8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    • SHA512

      531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

    • SSDEEP

      192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks