General

  • Target

    SOA pdf.rar

  • Size

    609KB

  • Sample

    230919-gj6heahc24

  • MD5

    593023599b06ed51c011af0e1f0931ad

  • SHA1

    57c3e88be5eb1fdc5770951c4211a090c60c207d

  • SHA256

    d378230fdfb7e17abf665720c659193a84b57d1605a6c78ad403d1e9e8c01ec1

  • SHA512

    970510301f6b23485c3443b038fc14ff635b6d60663705ce8e8b3726496705af8ffe1d3cfd2e0a9c5346d082f06bf1431054685e67f6064a0eff04888deeada0

  • SSDEEP

    12288:kZTXhOIaDM3AGB2jCfpo/y6Bfau+PNrbxUNqEt6WnGw688Al:YTAcijCAf8iNqDWGwTLl

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      SOA pdf.exe

    • Size

      684KB

    • MD5

      ef016c57887c795245f3c993844050b1

    • SHA1

      a01a18332c13b3fea59c7ff5b2c0efe89811c5ee

    • SHA256

      19e6653f249d7283999ba5be8b4154ccf64693cf228c7f7b4fde670f9fbed711

    • SHA512

      ef833dda1825b56120174e8c79edb371ee6e3441b384d623d198e8968250bd7cc08c475c00cd30656d8300735c3da308019a9d1f10b8ff324ab054e409541b15

    • SSDEEP

      12288:p4YpAfDuHOXEjxlubLoPpoL6HrOngIVGYm9qv28y6+Jz1g5:GYpgOjxlioxXHrOg89vRy62O

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks