General

  • Target

    TNT Invoice_pdf.exe

  • Size

    404KB

  • Sample

    221125-h7vw9aag37

  • MD5

    f80abe76555b4a785cc99f5c28b005c2

  • SHA1

    85748a350dc49454ff17845fd8275d065bc73229

  • SHA256

    1934d67c56986a33cc6a786899f4bca45886ef7ddcb1abcab4a8061e0abe1a5d

  • SHA512

    f415e6df708bed4fd7dbc443c13f23381cf1bc256d8f82922cbcb653fe131f000cbb38a207c032961673d6f8aab796e0e83f46899c5067ddecc28ced9ccdc9ae

  • SSDEEP

    6144:LBnb2khrC61MSvEufUEWS+jahhoaU0HEpah8yLAw2QA8ffkXF9Lq3IXxjnGi/He4:FnhSoU3jahhvTHCe8Ad2QA8iTqexH+/g

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5731015181:AAEnN7QEEeN_fBCr0YFv_H7lrNpKS_lkspI/sendDocument

Targets

    • Target

      TNT Invoice_pdf.exe

    • Size

      404KB

    • MD5

      f80abe76555b4a785cc99f5c28b005c2

    • SHA1

      85748a350dc49454ff17845fd8275d065bc73229

    • SHA256

      1934d67c56986a33cc6a786899f4bca45886ef7ddcb1abcab4a8061e0abe1a5d

    • SHA512

      f415e6df708bed4fd7dbc443c13f23381cf1bc256d8f82922cbcb653fe131f000cbb38a207c032961673d6f8aab796e0e83f46899c5067ddecc28ced9ccdc9ae

    • SSDEEP

      6144:LBnb2khrC61MSvEufUEWS+jahhoaU0HEpah8yLAw2QA8ffkXF9Lq3IXxjnGi/He4:FnhSoU3jahhvTHCe8Ad2QA8iTqexH+/g

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks