General

  • Target

    invoice CHN1080769.PDF.rar

  • Size

    717KB

  • Sample

    240521-vf9ybacd6y

  • MD5

    5c9d502a4a04531c2463732f2732c0cc

  • SHA1

    5b623c3b66c4730967fb689e4a96a1aa1406e419

  • SHA256

    6fde7f531438d2122f5b9b31f9aca0d1fbbef59e20d73cf81eac9b6250dededc

  • SHA512

    9b27ced6156546db428de4dbc1a9416bc59e96d12a087885b970ff3299daa224f41725adb35af6d998989efb924915d9aff07ae857f2ab9c8461feb2d49185de

  • SSDEEP

    12288:f+EXwCueQKeFcnplN3bs/OuCULH9dnMou55Wdchic3HpSWM2VwHWPp/:iCueQXOV3bseI5u5w6iOHH66d

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      invoice CHN1080769.PDF.exe

    • Size

      761KB

    • MD5

      77c6015c8c679abe8cd11cb51125f6c9

    • SHA1

      f9fd8a7f13b03480ae58622c228d6a6bb660f409

    • SHA256

      63219f4d5975bf956a1c5c8b98011f721cfb1e2b4894c6ec9f5a94d77e2652e8

    • SHA512

      510a8a2e2905eebd97bbda9e4cf183392b59aa18f9bb3278fed82fd10721ebc1ad06633992e6f4ee8b4eb64b4d89cf185aeab3b316d041ccb523c0d46110f52a

    • SSDEEP

      12288:YzDn6yWn7fcpVZlu/6uHD73sYw0WJv1/wHiksaGdt8qmUMbpG/IinMkqFozGrCWW:sn698VVYHst0WrTkGrpm4/nMHvv/QO4v

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks