General

  • Target

    9bb53799bde0d349927aadb0ec2a52e0b783efb1d8520adeffc4222c36bff093.xls

  • Size

    654KB

  • Sample

    240516-bzl6taed2s

  • MD5

    eb36a60bcbb2ebc9589dfba194e0fe4e

  • SHA1

    bb4d8cff5fb3d4a3c33f15f0591fa531599192c3

  • SHA256

    9bb53799bde0d349927aadb0ec2a52e0b783efb1d8520adeffc4222c36bff093

  • SHA512

    6cd8d5c009f6138a2ab97f3fcaac29be007483a64204454f0e89855c92167831710b39b167ccb8beb368e51cf1f89fbd9026ae29aed947f2949e46f4f1435e03

  • SSDEEP

    12288:3kTCQ5HK3hrUP/qPQZR8MxAm/SzxQE1Rq+v1mzPs6eWfo/e36RvZFg:GCQ5HKRrUP/mMxqaE13sY6BA/e3

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      9bb53799bde0d349927aadb0ec2a52e0b783efb1d8520adeffc4222c36bff093.xls

    • Size

      654KB

    • MD5

      eb36a60bcbb2ebc9589dfba194e0fe4e

    • SHA1

      bb4d8cff5fb3d4a3c33f15f0591fa531599192c3

    • SHA256

      9bb53799bde0d349927aadb0ec2a52e0b783efb1d8520adeffc4222c36bff093

    • SHA512

      6cd8d5c009f6138a2ab97f3fcaac29be007483a64204454f0e89855c92167831710b39b167ccb8beb368e51cf1f89fbd9026ae29aed947f2949e46f4f1435e03

    • SSDEEP

      12288:3kTCQ5HK3hrUP/qPQZR8MxAm/SzxQE1Rq+v1mzPs6eWfo/e36RvZFg:GCQ5HKRrUP/mMxqaE13sY6BA/e3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks