General

  • Target

    Approved E-DO PDF.rar

  • Size

    637KB

  • Sample

    240502-qq8e1sca43

  • MD5

    a1ec77271287f41a17afdabdc3d2269a

  • SHA1

    9a07780f0885e12ab9a8f7e2d4493048879353f9

  • SHA256

    21a6150f936a6e5a0771a0f1e9f4ee829c39de4f04d36c04eb5c2dace6e46987

  • SHA512

    9919668c9d49352cc7ef06ab479ac4a6c4091f1e3d6b68ffbea9e04cfacdd9b12b22b1f803682b29570ada50ac73784f08bebd48c2ab0aacaf8812ccd92232cd

  • SSDEEP

    12288:2rMqCscVhmISZj+6DHPD9xPWraW0OVxuB8/cSZuO0Esb+viAmuWkA:2rMqomIYj+6rL9ZI0OHu6/cSuK68A

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cojosem.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ZARHLOULBOSS123

Targets

    • Target

      Approved E-DO PDF.exe

    • Size

      698KB

    • MD5

      ccd1edccbd14c9c0245099ac2920be83

    • SHA1

      77a57f47e0660da5a2a1969392cf0aa962c5eed8

    • SHA256

      56f69825010da76642ee25cf55098c51f6ded6f6fe2718b6c69c1c4b74b57c65

    • SHA512

      af3b651c6cbd0752b001264b0ecbf7f254af2ae832b9d862f99b5fa818f540254c878b7b64d0f422e12029890584094fef73cf56c1ed5aa82dfe1e2fd77a0c47

    • SSDEEP

      12288:JO3/T3/fVrTtK3/y32K4J8wqCfqIP5Otr7VnYixibuRtgiTn+aEoQG527KCHftop:srXVrTtKqmfqClP5OVdY0iqRKuEG52er

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks