General

  • Target

    09bcaddf5bcdfbacea531402e71416310a536840af3b8318d9b533a621ad9121

  • Size

    1.6MB

  • Sample

    231121-tefseafd85

  • MD5

    fe94255c3eb64051b260e638f6049b0b

  • SHA1

    ab3d7fe8df71eee66ba844d4d5c03fc21e8a3f62

  • SHA256

    09bcaddf5bcdfbacea531402e71416310a536840af3b8318d9b533a621ad9121

  • SHA512

    36250dec29af59beec80520da18b5f94d90a9011412a1f0d136259266234927e92182a947a5747c976565c40c78bca94fa66aa39059855bccc6817ad06fedcf2

  • SSDEEP

    49152:ujcPFcGkHZUKEXA0nqYbNJjZT+5GNQ3Yqy:ujcPqGxrTNfTjSoT

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6811423600:AAG2aeIaNsb7KhtKp1Js71i-PwGY1zN7uIg/

Targets

    • Target

      MT PEARL - T.PDF.js

    • Size

      5.8MB

    • MD5

      07d87f8a2836402d7d6d121b4ac64850

    • SHA1

      2643de7c438bd735d4730a40444fd41c2eca6712

    • SHA256

      d65d4a47bce8ac5360c92d4be30d043207c6d6d39b9b2709bf37b9b23a7b5835

    • SHA512

      5dc8a13c2235ba5496f95be0310e38b4498fe3113cd7534cd6c18dd52176fcf36a31944a5822a2962624d8ae0e0f9930ca0ea2a5a3531c823ab7eaf16e0ca966

    • SSDEEP

      24576:2nZ2HSB9a3Z6opVwL2EnWfPyAIbjnwYh88Y/tIT0L66ZTF8hi/tbUDfkPwcAeZQw:Ea5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks