General

  • Target

    PO-23456543_pdf.exe

  • Size

    358KB

  • Sample

    221207-yh4e4aah7y

  • MD5

    7db0bc0c978bda0048ac2944b9b86245

  • SHA1

    66e87764ff09ebba04681cbc2c61a43cbfa595b5

  • SHA256

    2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063

  • SHA512

    a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb

  • SSDEEP

    6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5801961827:AAHU2YhkfiXQwgVf7WnbO6mcJG_3zpTOec4/

Targets

    • Target

      PO-23456543_pdf.exe

    • Size

      358KB

    • MD5

      7db0bc0c978bda0048ac2944b9b86245

    • SHA1

      66e87764ff09ebba04681cbc2c61a43cbfa595b5

    • SHA256

      2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063

    • SHA512

      a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb

    • SSDEEP

      6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks