General

  • Target

    08052024_0319_07052024_Request for quote_PO-240102.pdf.z

  • Size

    676KB

  • Sample

    240508-dva9vsga4x

  • MD5

    3672a85768f94630bb1656da3a7fde3d

  • SHA1

    73d26874d81416742c32455c441c5bbf1ba9fa67

  • SHA256

    bd9128205fb890e1c7b9a29b28e9976ae4b545e1034c314804b4854544707223

  • SHA512

    5d7462f8392a4eb46aab6b9adee396b398da2ab8a263b41488285c8ae4cd91e1874d31acfcc3cef083676a44ee6a6c844222dd9c79d336ecd16e33e1ee2a1fcb

  • SSDEEP

    12288:+oMX3WmPvYLYI3M/LHLgWxHW1Lfkg45xU0nkqLrUWQiKBP0rneT//:cGigUqM/fxHW14zrnDLxmBSg/

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dKjVwpK4 dKjVwpK4 dKjVwpK4

Targets

    • Target

      Request for quote_PO-240102.exe

    • Size

      722KB

    • MD5

      ca91c42a8f1efc6763c7da3d28371f0f

    • SHA1

      f777b12bedb4606df5d06bd3c6fd5bbdf960d436

    • SHA256

      cd8c76f494fa0be5e4267c0552f32fccef575a76801d7b2f01fadc382d589118

    • SHA512

      1ac057c224101285916062d7a7f64f1ab2e37e9e4addfbf06c60d4209e20be52b2613ee15f96f05b3f440ee2f5eef4aef1f8100d6cdd9f6159ec6a99289faaee

    • SSDEEP

      12288:LTrv2iNj/SHl/T7BA2N5MGCp0OzD2GLqYQiq9VgxpvnQxXoVb/xhfIItWo:Ln1cHtnBNNyGCp3/qYQiq9VEvnQxXobV

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks