General

  • Target

    New Order Pdf.exe

  • Size

    459KB

  • Sample

    200707-qsnfvwl9ss

  • MD5

    9d6aa04e5da966fdb8ebb93dfdd6550e

  • SHA1

    e41e80eb1a16f2744411fc2a04da21b887c2aa02

  • SHA256

    2c9caf997f04e5e500275f4660f1a9d629db8a8496629955afa159a614c5f74b

  • SHA512

    278205a5cf6c806747fc1372a5cdbc3e3aa8f1384a030ad89e08ba9e91e4a40688dba501269b8e67dca43cb224a1b427d8122b9f8629a7e5d97ca9f89bd4f8eb

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rajalakshmi.co.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    009_DESign1*

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rajalakshmi.co.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    009_DESign1*

Targets

    • Target

      New Order Pdf.exe

    • Size

      459KB

    • MD5

      9d6aa04e5da966fdb8ebb93dfdd6550e

    • SHA1

      e41e80eb1a16f2744411fc2a04da21b887c2aa02

    • SHA256

      2c9caf997f04e5e500275f4660f1a9d629db8a8496629955afa159a614c5f74b

    • SHA512

      278205a5cf6c806747fc1372a5cdbc3e3aa8f1384a030ad89e08ba9e91e4a40688dba501269b8e67dca43cb224a1b427d8122b9f8629a7e5d97ca9f89bd4f8eb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks