General

  • Target

    Quote#2310303384.pdf.exe

  • Size

    1.0MB

  • Sample

    231031-jd4gzahc8v

  • MD5

    68b879be204b03f9a594a25014a1b232

  • SHA1

    b7fe021e563304860847286323ade58d5fab175f

  • SHA256

    0a05f095a607b11fec6ad7e90f87cbb51d41b3b2911c54630e819c84ab6900b7

  • SHA512

    8eff16954c4d1247f1252d796db7ac91bc0242a7df06014d7aba746c1a76bd06907333fbfe0a7ac46eae354ea1472e71ca9f324fc3a99f9299023dfb18c0b71e

  • SSDEEP

    24576:qbrZD0QxyHwIwAeTd7xdDcpATJcZpWhC9FaqmRh3o+RZF:qlPIwAeTd7xdYpoYvdmFRZ

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.planeteducation.info
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bmnoidaYYY!

Targets

    • Target

      Quote#2310303384.pdf.exe

    • Size

      1.0MB

    • MD5

      68b879be204b03f9a594a25014a1b232

    • SHA1

      b7fe021e563304860847286323ade58d5fab175f

    • SHA256

      0a05f095a607b11fec6ad7e90f87cbb51d41b3b2911c54630e819c84ab6900b7

    • SHA512

      8eff16954c4d1247f1252d796db7ac91bc0242a7df06014d7aba746c1a76bd06907333fbfe0a7ac46eae354ea1472e71ca9f324fc3a99f9299023dfb18c0b71e

    • SSDEEP

      24576:qbrZD0QxyHwIwAeTd7xdDcpATJcZpWhC9FaqmRh3o+RZF:qlPIwAeTd7xdYpoYvdmFRZ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks