General

  • Target

    payment copy.pdf.z

  • Size

    646KB

  • Sample

    221208-s9yq2aad73

  • MD5

    c7a11a7fd3c8e42e8d16265a2cc12f5d

  • SHA1

    f0b9a51e3f5f27a6290d5bac7aae3b251c386655

  • SHA256

    37da8f89540f4dae114f1f55cfd4d89be9582fbd480ac6ed6c34ac04ec8d576b

  • SHA512

    0e3524d9b9a9bbea25b01ba7cab8c06d975066f6e6af08a36666c05123f385c8363cb5b412d23bd5960acc1ad989b27063a3e1704e3661d1ba66bf64e9524e18

  • SSDEEP

    12288:jiE0YCjbwMh6ny+h+n6SN/PAQDnNNTtcvCEYLPQE5FiER3RiSbhXwS:eE3K0Mh6nyU+6SOQ77lPQaFpbeS

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      payment copy.pdf.exe

    • Size

      874KB

    • MD5

      19b12dc02fe474dead3c44c468554d6f

    • SHA1

      9407e38cea8b04705f433a7cb91ec25fda611263

    • SHA256

      3ccaf74f465a79ec320fdb7e44ae09551f4348efd3bf8bf7b3638cc0c1cd8492

    • SHA512

      2ede1e930e060451ebba68396cca0eb4a7dd3c65a2b0039f87dd687a5f8876db58d14add581303de9ab890865fba312b0db1f3c2cc324bf9584a10993cec4ad3

    • SSDEEP

      12288:knoQgKZ/nXt7virmWhlGLaQYImptNmkEcPbiZx8JCozVpSs8X45jOCXJWfBhib6S:kGNwK+EJCozno4RQZwbUIxxF/Xzr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks