General

  • Target

    PI-358765432_PDF.exe

  • Size

    1.1MB

  • Sample

    220915-jcgxksfhhr

  • MD5

    d292182bea19a74cb740f60d1ee1cde0

  • SHA1

    901afe7ad14a7a0de4a93c22cdf093ff2a5c4564

  • SHA256

    dd109113aac69f1a79bdc5ff7b31f61da28cc13ef4b6cbe4c355342490ab6c4b

  • SHA512

    c3ffa59d5c6e2d13235e6e4e38e84ed1568e505596f93f453a51d79293cb232b8e768f1282dc8757e0deea3ad8360adbb0e4ff15c109e1dff71a9cbbaf36e1b3

  • SSDEEP

    12288:ivNjVr07hwEclZQ49XtDzw2oiu7kL/DnMyKakFz4/y5lCmywX2Cn4eorpxA6g:mxE343zrvHXKakF8/yn83ZrZg

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.huiijingco.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    lNLUrZT2

Targets

    • Target

      PI-358765432_PDF.exe

    • Size

      1.1MB

    • MD5

      d292182bea19a74cb740f60d1ee1cde0

    • SHA1

      901afe7ad14a7a0de4a93c22cdf093ff2a5c4564

    • SHA256

      dd109113aac69f1a79bdc5ff7b31f61da28cc13ef4b6cbe4c355342490ab6c4b

    • SHA512

      c3ffa59d5c6e2d13235e6e4e38e84ed1568e505596f93f453a51d79293cb232b8e768f1282dc8757e0deea3ad8360adbb0e4ff15c109e1dff71a9cbbaf36e1b3

    • SSDEEP

      12288:ivNjVr07hwEclZQ49XtDzw2oiu7kL/DnMyKakFz4/y5lCmywX2Cn4eorpxA6g:mxE343zrvHXKakF8/yn83ZrZg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks