General

  • Target

    RFQ.pdf.7z

  • Size

    581KB

  • Sample

    231011-pr3eqahg46

  • MD5

    9abcadab49a7a62d41cf905e8cdcd3e8

  • SHA1

    d1dcaada41629ad7423d95a8abd90873094426be

  • SHA256

    fecfbff7615bf720654c68fd6800e5fac8d9276fcb80bf16375cb14f037d6c2d

  • SHA512

    115b9dd2ec6352523c77c7db1b0282f06099ce2ddfbf59f63b3899f86b0dc53b6dd8e55c184979e806c55b11e36664d90e31010b2a65bbe00ad0e925b12988eb

  • SSDEEP

    12288:oN8xJt/Ceb/AN2uIuuKGZJEUv9Wvo9LLboTgDUzRcT7l+:oN8xzTYNvIFjZvUv2bfUCT7M

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      RFQ.pdf.exe

    • Size

      1.2MB

    • MD5

      daf2e231fc08ffc2d89b382e7983d8ca

    • SHA1

      586630a252691f839da27c12ff7a222fce5c1267

    • SHA256

      2a5a6a4dc7b104e406e7bfccac0b7f2ebdd391626ec8afe1ba5adeee733ef339

    • SHA512

      fd8094b0e107583022f209f859e8e5072492f902de7adefc2d42ec6bba2b4d923dc4be727935d4fa78acfa9b5cd675441f16c927d50f62c2461526aa6721becf

    • SSDEEP

      12288:pL27YqLkaIR6eFFyQb/3wduIuJnuYJrBv9WrCHMKutxD0zegFmfZKbpNgPorFv2T:pKLq/wcISuYrUrCsYP0F

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks