General

  • Target

    TH PG FORM E DRAFT FOR CEI2303125.pdf.7z

  • Size

    523KB

  • Sample

    231011-r7zpwaga78

  • MD5

    df0174630850cbbad6751831d7dd87e5

  • SHA1

    a7773dadecb1c6648e50cb5c7781d8976b63fad4

  • SHA256

    ba4bb4f3c8ab492f91afef4b78fbb3a51a4e7d42ece2c7d8d36822cd83c85bde

  • SHA512

    dac29a1a8a268cc5ea4015136bdc52f46e0e0652fddcf78c35e60ff66115dcee3d8cc5cec72e458f530fde9e261a64eb1405bd89fa5f71f7c44dec1e616a2a65

  • SSDEEP

    12288:RJhJNnqQN8gw27JYDnM5aUTpU6hHrxLS2NMpIeNKGsBq0sq9d:HnpXP7JYYFb4IpBq0l9d

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      TH PG FORM E DRAFT FOR CEI2303125.pdf.exe

    • Size

      988KB

    • MD5

      06d1f96907c8265da37dfd9dcce3bff3

    • SHA1

      df6e90bc4534b80433b045ba767d62d3f170ae6e

    • SHA256

      1934c9d93e6a4198e68757441c611e6c31306b38aeec33a5f1f6c09f1f8ce466

    • SHA512

      3b7562f2a03037ce2b4c3fdf5f5391ba8036697939d336f9b23a835d717297397f32e65815cfb55c949822012200cdd89a7ea95db6269488eb391b0911917aa8

    • SSDEEP

      12288:OWoCRCrFF1HvV7J9BEMF/UTpUMCyrxLxoWMLI8N2RMXmPqpYyEiGen55bQ+k9iFs:BoCRC77J9tGtWINag

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks