General

  • Target

    nWaybill_Receipt DHL4704321510pdf.img

  • Size

    188KB

  • Sample

    230707-qyw2ysaf2t

  • MD5

    d97877e6e4838faffc8cc86541fa36a2

  • SHA1

    b5ce082953d027cbb970582d2be28e3dcb066b5a

  • SHA256

    e724d07cfaef54796894b9738d5a67d876bc31b12608e251b419b1c1f24afa53

  • SHA512

    c5d07afd5fdb51875c9ad8cef89d7f43c89225ba8167917e10cd15ae6c1214257e2b7b5d96e805e18bccb25ddf6447c315572fdc871c262241d2616e91bbbe36

  • SSDEEP

    3072:H64/4iUSMBl+jh3rvkA2GSFVfxpuu6xr4o3qd:H64/4pSMB83rIXxpHo3

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot2100759405:AAHQxGXNxGeuNgcAgCwnT3oqpIfFhYBuhgo/

Targets

    • Target

      Waybill_Receipt DHL4704321510pdf.exe

    • Size

      137KB

    • MD5

      6b512fd94524086c363a2d12863b741e

    • SHA1

      383d836a88c06f0d8cc0f6f8249c7fafece7e2c9

    • SHA256

      98f78a6c3ba93ab5350b3d148455261b214e9f29836f56305a0f8f72a7690d4a

    • SHA512

      c724945eaa686ae365648dd129f572fdba582d5a94583d83935d58d572b6731c6d4c438b625b96237ee9ae731b9f6bea114c0e8548c141e2cc6bc32f08be185b

    • SSDEEP

      3072:M64/4iUSMBl+jh3rvkA2GSFVfxpuu6xr4o3qd:M64/4pSMB83rIXxpHo3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks