General

  • Target

    NewOrder.pdf.z

  • Size

    694KB

  • Sample

    231206-tze2lsee9t

  • MD5

    a259ac731b40f4d06231b207992ad581

  • SHA1

    96106e9bbdbe086164ac2bfbca552b620e391fac

  • SHA256

    12fa1a75fe1d135efcd56809fb857d37831490416430785f1bc5e207c8c63168

  • SHA512

    022f39b21b6fe8c80f6213c4b42dee653b706c2b5238d02b269f35fe321b43cab534c71af0f0d5c2df8b13f06cd3e0474ef9d0beabc2446cd2f6e558edcd058e

  • SSDEEP

    12288:VX5XsbVha/kCK714kR9a/NaE67hksVO88PXfWp5dt+pkePR3/bbpNQ:h5cbVSS3TyNaJ0BPXf85z+HU

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      New Order.exe

    • Size

      737KB

    • MD5

      e8cbd5675d4c737a5ae343e52f0d8449

    • SHA1

      73b7079173f8f8086c049013cebda7d6df8e01ce

    • SHA256

      ef5ac294d9362a9da60b52494588ed6e21b291acbecd15ab99c192d78add24f9

    • SHA512

      ae4de1a8b3faae583c634b5f108eae96d72c417b5338ad8509d5a6eeb5c421573321070a794793af0496279751c96e7af471345141b50dc68dd4f4b4ae2ff73c

    • SSDEEP

      12288:vqc3+GCueH5qEbnvaKi+YEuRKfM9Dna9hzHT+xVlMsRyFd3ouXfYfUqJJu8hBBek:v/uG2qE7I+Y0LGxVlMdpngfUcthSkkkN

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks