General

  • Target

    NEAS.NewRFQCO213538PDF.ace

  • Size

    836KB

  • Sample

    231117-v4knbsch2v

  • MD5

    03d4cd64d2f6d5f9a8897f3507b6e4e7

  • SHA1

    4e38f8f98142501e83e309d1a30215e2a7e17b7e

  • SHA256

    10c7529595589edaefb4335f222e725d1ead2a883894fd582651367a47f1dcf4

  • SHA512

    23a5925749351c11b889320ff80de64a23acecfa9aec34d16c515793d887baa958d5bc6593b729a8861e6de902336111fd38244922be1cd8ce8466988ee76067

  • SSDEEP

    24576:wXWXqjomPG9AdgogzenBAiYQ5ae9F8Ii5n+DnC:wnjomP+AjgzenBR5Jf8N5InC

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bresciagrameen.lk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    #S413vT0u45#

Targets

    • Target

      New RFQ - CO213538PDF.exe

    • Size

      1.1MB

    • MD5

      b86674a5cb924fe5895029aa636d0b58

    • SHA1

      273deb89fa7153693eaed57fceeae703c74dbd58

    • SHA256

      97fedb6d9e57b74b6d077d6430c28fb649c29f60f731acf87165232531182196

    • SHA512

      569570c2511c921db4bee959b06a9ad249e61cdb8ff5d8927a742177731bad13e8d71c79b0881a8dae3b8f4170a3c0eb1fe555a6a9d28ffeb7e805f2aaf4d094

    • SSDEEP

      24576:OmlEanV45y5MQVQw1uYm1ci2fM/gVihgb+ZLOsLW:9EanV44rQ9Ym1YkYLKOS

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks