General

  • Target

    eurdvswiftsend_30082315823613_pdf.exe

  • Size

    659KB

  • Sample

    230904-jhxj8afa69

  • MD5

    a9c1c56a42de4df874d9faefa5e8b14a

  • SHA1

    835b27ae359dc86c133748de9e1a00be7f7167ad

  • SHA256

    631c44548b7bc8c13c2a2025275f90842523dacd60046eeabea9c3da8d20c926

  • SHA512

    d4525fe8e7ede099f11cf8f17736cf02a34ff8b40f6d324d0a5ec616ef2e75307e84a0b95ebb363fef7ea5633f653240e84d8be00faf16804bac9d50fe60e76a

  • SSDEEP

    12288:2JfOZ1734F6vh9rLMPQu0VXjEw4PJn+wH4AtY4DwP9FHCKuSzdJG:uWZBE659roPd0NT4PpP4A64G9sQ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      eurdvswiftsend_30082315823613_pdf.exe

    • Size

      659KB

    • MD5

      a9c1c56a42de4df874d9faefa5e8b14a

    • SHA1

      835b27ae359dc86c133748de9e1a00be7f7167ad

    • SHA256

      631c44548b7bc8c13c2a2025275f90842523dacd60046eeabea9c3da8d20c926

    • SHA512

      d4525fe8e7ede099f11cf8f17736cf02a34ff8b40f6d324d0a5ec616ef2e75307e84a0b95ebb363fef7ea5633f653240e84d8be00faf16804bac9d50fe60e76a

    • SSDEEP

      12288:2JfOZ1734F6vh9rLMPQu0VXjEw4PJn+wH4AtY4DwP9FHCKuSzdJG:uWZBE659roPd0NT4PpP4A64G9sQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks