General

  • Target

    IMG-326112578pdf.exe

  • Size

    401KB

  • Sample

    231207-pncpwsaf34

  • MD5

    c34ab78e648dde60a62cc57047afd837

  • SHA1

    21ab2cf556f18dae56926b6865ff1b2b301a0a2c

  • SHA256

    ba9ed4cf0233d090eb469e2e913e9492466135128ed0fa0ce62ac3bea47ccef2

  • SHA512

    21a8f651fb9f77fa7ddd9836a3e531b2221370313b7e9313ddf8f5064b164dc9b8ab327464161aae3306ca546c7daa0fb059c5ed32d4e18a7b43442206c12044

  • SSDEEP

    6144:KvtrXHXinpS1XvghhrvhB4vLUN+3uKrnJIR9oFxXd6w:KNXcgX8vhivAN6A9W

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    server1.sqsendy.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    4B&)2?E3_!2K

Targets

    • Target

      IMG-326112578pdf.exe

    • Size

      401KB

    • MD5

      c34ab78e648dde60a62cc57047afd837

    • SHA1

      21ab2cf556f18dae56926b6865ff1b2b301a0a2c

    • SHA256

      ba9ed4cf0233d090eb469e2e913e9492466135128ed0fa0ce62ac3bea47ccef2

    • SHA512

      21a8f651fb9f77fa7ddd9836a3e531b2221370313b7e9313ddf8f5064b164dc9b8ab327464161aae3306ca546c7daa0fb059c5ed32d4e18a7b43442206c12044

    • SSDEEP

      6144:KvtrXHXinpS1XvghhrvhB4vLUN+3uKrnJIR9oFxXd6w:KNXcgX8vhivAN6A9W

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks