General

  • Target

    Quotation PDF.rar

  • Size

    637KB

  • Sample

    240429-qms6xsbe58

  • MD5

    27736c2799bb3da671b5ac32c492d66e

  • SHA1

    0967c768b3328adbccfebaa13c619f3f5cd6ffef

  • SHA256

    5adeb944aad149482098300397b26da3508a5ea50f8d0ede8a23afaeb3d464e5

  • SHA512

    93af7df82774ad9df6f7e3c3dcdfa105209224be5527765143b173209a819f1326ecdb3385f15efbcb54c1a9c27737d9ec42ee7df51efb304aaf0cebdf0b23d9

  • SSDEEP

    12288:7shY2ndQmjoPxmD2+tLojhb5Cwe1GTFiWazmqDRhPPTx:wzn9/COLESG/WmqD3Pbx

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.fascia-arch.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    HERbertstown1987

Targets

    • Target

      Quotation PDF.bat

    • Size

      659KB

    • MD5

      98b8971518202ded11fdcc151ed02557

    • SHA1

      25628dc2c0a5d72dc211d927a93ce8b267c1c610

    • SHA256

      a689e5f1c8d3a195368dd62cf94953e55abbbb87f75e0363a6d09dfe2bb2bcb9

    • SHA512

      f16b2994661ca330c591400d42c899ede141ef3b5c23fb453c7c8dc1abc8265b2113bd4e0ccc7c4a6d729e6ef603df654298ffb502af5a985c980508034234d1

    • SSDEEP

      12288:aLbB778QvvMehgHaUJ4h+665eeTUPdphLhPf0bPp75mumu98FkEVZ9LfiN3sTxYj:GbBhMCwip65EVzL5ox7r96DFLfc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks