General

  • Target

    new-order_20191102_073809_405251-PDF.exe

  • Size

    730KB

  • Sample

    230419-kh522abc2w

  • MD5

    4befd99de8dedfeeb5cc7062663f561e

  • SHA1

    670fa767ca9a9944896d98c1c14a05529c5579f7

  • SHA256

    b4360f2d64d4b59c5dd1b56ccb7ed8233eeddd871fff3dd4ca9f9bead820cdb8

  • SHA512

    9d990e844d00bf8c6df40f7d415911c7f946d9e9cd2c5bc627ce29b9e5174bf3308b22ceb84954e00c5364b0759165347cec79e624468aa953658799717f3cc0

  • SSDEEP

    12288:UY+IO6T88SoOiIiKApCq6/6mNGH3igjDrnLSmvc+0ZV7WYJgqFI:UY+/288bOMB0Nq3rDZc+wgZ

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6261006732:AAFiMpPz79k5Wkkw0xvICpfaipqXFQbQmmo/

Targets

    • Target

      new-order_20191102_073809_405251-PDF.exe

    • Size

      730KB

    • MD5

      4befd99de8dedfeeb5cc7062663f561e

    • SHA1

      670fa767ca9a9944896d98c1c14a05529c5579f7

    • SHA256

      b4360f2d64d4b59c5dd1b56ccb7ed8233eeddd871fff3dd4ca9f9bead820cdb8

    • SHA512

      9d990e844d00bf8c6df40f7d415911c7f946d9e9cd2c5bc627ce29b9e5174bf3308b22ceb84954e00c5364b0759165347cec79e624468aa953658799717f3cc0

    • SSDEEP

      12288:UY+IO6T88SoOiIiKApCq6/6mNGH3igjDrnLSmvc+0ZV7WYJgqFI:UY+/288bOMB0Nq3rDZc+wgZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks