General

  • Target

    RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe

  • Size

    380KB

  • Sample

    240508-jcd6pahd2z

  • MD5

    c35a5008193e77c7afdf53d7fcc20f37

  • SHA1

    1547e797fc8dfebe43591583b7f8c5d130eafc77

  • SHA256

    b4702b8caff8174aa2faaf8f2e963d6ae79beee73054747db74b2cc21997885c

  • SHA512

    1658f60e7a7813c52927ff025ef26381da54a75c0a505ca271940f1dd02503510476eddedcbd9f44dc56d2dad27c32da4eaf21bd4ae71a23fd04131578ec861b

  • SSDEEP

    6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.eu
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    office12#

Targets

    • Target

      RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exe

    • Size

      380KB

    • MD5

      c35a5008193e77c7afdf53d7fcc20f37

    • SHA1

      1547e797fc8dfebe43591583b7f8c5d130eafc77

    • SHA256

      b4702b8caff8174aa2faaf8f2e963d6ae79beee73054747db74b2cc21997885c

    • SHA512

      1658f60e7a7813c52927ff025ef26381da54a75c0a505ca271940f1dd02503510476eddedcbd9f44dc56d2dad27c32da4eaf21bd4ae71a23fd04131578ec861b

    • SSDEEP

      6144:IUj/wCLmZS6+GpBAcbO0gDKeD8Wk4ubDWSOeij1aNltfkafgIxhQ5Y8HndM7zgD4:Iqfmc6+GTASWjkx5OeScNL7hQ5DHnC+4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      a4dd044bcd94e9b3370ccf095b31f896

    • SHA1

      17c78201323ab2095bc53184aa8267c9187d5173

    • SHA256

      2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

    • SHA512

      87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

    • SSDEEP

      192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks