General

  • Target

    Quotation No. Qtn10077_pdf.img

  • Size

    1.2MB

  • Sample

    231206-m5tcvsdh89

  • MD5

    f3afc866b89044386e6556879698009f

  • SHA1

    dcf91a092701061b15a6e12ceccbe6df65d7084d

  • SHA256

    a1f2f873e97a5fd8fc4d3f2847dfe78e3dfb29477909c31b5cdfd837feb1eb9b

  • SHA512

    2256902e908a4657e44ad1a3ea32c290e4bcd0733dd47c9e14c25d617b7dd47c08d8b37a75af0573a234262ca4b750f8ca977c3effaad879acd6569e89e3bd10

  • SSDEEP

    12288:UueH5q9T7vB5DaHvvqvjsguQL3/7c/CaesrEAfZJ7BU/X:Yqp7J5DasIgn3/7JIEMZJ7BUv

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Quotation No. Qtn10077_pdf.exe

    • Size

      695KB

    • MD5

      31551a88926803c70a9e980221e78725

    • SHA1

      dd084cf17da2d7b527d6155277951f6c2cc39e53

    • SHA256

      60dac627fbdc535bbe16d77f574a17deae993bf0b70e0ca445bea798e8e62e91

    • SHA512

      9685c9a31bc7315ced6e00aa48ab11487d865d94e99b8dc100c887a8703c2d16151dc7af704ced6f339d61c17a3a44921fa5139c4c6e44204a3b5d692893db73

    • SSDEEP

      12288:NueH5q9T7vB5DaHvvqvjsguQL3/7c/CaesrEAfZJ7BU/X:7qp7J5DasIgn3/7JIEMZJ7BUv

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks