General

  • Target

    Order_ OFI-MAR-2024-000019_ Valve pdf.exe

  • Size

    626KB

  • Sample

    240319-n9qyzacd8z

  • MD5

    3f7c37acabf627bec3852972021a00db

  • SHA1

    cd2e26c173abecae88fb2cd3bd2bd163785e1f20

  • SHA256

    2f34b538be532d42d6bf9c9f2f54442355991ed12b15ea11a3cf0c7382df6f7c

  • SHA512

    0f191f90aaa727317698bbf2dcbc3f80e76daae128eac9c0fa972aa2f3ee961572cd72df3d9080a980bb9a3c9799afc266ab161d6b1b041c4cf468bd94b49092

  • SSDEEP

    12288:pNHehc3NlZr8rtxCYSnN5kvUtx62v68toS+LdOJRYWqEkR:pNH2i3p8rQnN51t5v68BidOJbg

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Brillium360@@

Targets

    • Target

      Order_ OFI-MAR-2024-000019_ Valve pdf.exe

    • Size

      626KB

    • MD5

      3f7c37acabf627bec3852972021a00db

    • SHA1

      cd2e26c173abecae88fb2cd3bd2bd163785e1f20

    • SHA256

      2f34b538be532d42d6bf9c9f2f54442355991ed12b15ea11a3cf0c7382df6f7c

    • SHA512

      0f191f90aaa727317698bbf2dcbc3f80e76daae128eac9c0fa972aa2f3ee961572cd72df3d9080a980bb9a3c9799afc266ab161d6b1b041c4cf468bd94b49092

    • SSDEEP

      12288:pNHehc3NlZr8rtxCYSnN5kvUtx62v68toS+LdOJRYWqEkR:pNH2i3p8rQnN51t5v68BidOJbg

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks