General

  • Target

    PROFORMA INV.pdf.exe

  • Size

    661KB

  • Sample

    230515-j2pnqahg6w

  • MD5

    3d001a5535649fc075bf5f8badfd9dbd

  • SHA1

    43144b7961725f461084f8798003ba94fb20a58c

  • SHA256

    17fc4205571ea12188b9ed8b5659339e305ebc54bace4e3ba62c72c6b61cdfcf

  • SHA512

    5136686e6fbc8e48f4103def7ab9996709080969c2b413d27c4010165cbc3f7b5284875fb1d8009a4115110ef64d9028659aee2a17d00bf250b6785ed7d1e622

  • SSDEEP

    12288:UmYCfC6lnIFae5+clpuDUpmnjfArEO9UlPJB1F7RMUM:UmNq6lnIN+sVEjfAgRBJBT

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PROFORMA INV.pdf.exe

    • Size

      661KB

    • MD5

      3d001a5535649fc075bf5f8badfd9dbd

    • SHA1

      43144b7961725f461084f8798003ba94fb20a58c

    • SHA256

      17fc4205571ea12188b9ed8b5659339e305ebc54bace4e3ba62c72c6b61cdfcf

    • SHA512

      5136686e6fbc8e48f4103def7ab9996709080969c2b413d27c4010165cbc3f7b5284875fb1d8009a4115110ef64d9028659aee2a17d00bf250b6785ed7d1e622

    • SSDEEP

      12288:UmYCfC6lnIFae5+clpuDUpmnjfArEO9UlPJB1F7RMUM:UmNq6lnIN+sVEjfAgRBJBT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks