General

  • Target

    DHLPSZR00000336EB.pdf.z

  • Size

    726KB

  • Sample

    231204-v4v43adf81

  • MD5

    c66c0b0b16a2ea4d43bd2f365d61de26

  • SHA1

    97db15e678448e12b9638165f10eb6ddebdfcb7e

  • SHA256

    e6b6afad94ac3afa8cbc30af572dcff2a673a2f7f73ceb3c243f46c78fb3d0ac

  • SHA512

    1740f6f38841241c15094176dde7e4d28939b3ecf74d9e8c3d3828becf017309429932ae7cb079b4a195d87467e76449bac2c9242c3f1463cd349f36bc60461c

  • SSDEEP

    12288:B/pM0QJsAWbX3tDjI2FTKlGdB/njhpt2wD2Y4+FH4mZvd6W+tIY8REIMthZcBNGt:BYWZA2FThBfjhbDoOYmZtzVRwgGVL

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    EJPEOaG2

Targets

    • Target

      DHL PSZR00000336-EB.exe

    • Size

      812KB

    • MD5

      0ac68d87bdb803500fe1e773e9e3ec23

    • SHA1

      17f93653a8ea31bf208eddbd7b10775c704d2785

    • SHA256

      6eaee93f96963100221bee90dc15dc6d046951a7ce0a4aafe3ded7bbffa1b0e3

    • SHA512

      0bd505d5adfd7e20d941370f5300096602b2ceb1dff6170a1334376f78bab5faae14d6582e03239fd822847e02fde995180896d4704bef966ce7328ea5ce6089

    • SSDEEP

      24576:I34/up+pJqGLYgLwFvRS1e+J0nSoAHR0l:I38PJqGUgL0GeE0nSTo

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks