General

  • Target

    rSipariPO408232023ZNGstanbulpdf.exe

  • Size

    2.5MB

  • Sample

    240522-x2rpzadd9s

  • MD5

    f55d77a9d704af55b0797de1435706e3

  • SHA1

    93010de39c5e434291a439b65f6eb381b741edf3

  • SHA256

    5302c416b0abd845fe3145f910e82440588c11219940fe89fd68722260a9b508

  • SHA512

    0ad087c8a2290f890cb58535958566cf6a814415c58f20742d3074d27cd0e4e31f5f3d3a0a4945ec675c84ad99f9894c184ff69fcb702d19443a83729b19bddb

  • SSDEEP

    49152:VP6hSrcCPT0J6Lg31+mYGnKDVTXShVr7oL:2ujRmYGnKDVTOr

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      rSipariPO408232023ZNGstanbulpdf.exe

    • Size

      2.5MB

    • MD5

      f55d77a9d704af55b0797de1435706e3

    • SHA1

      93010de39c5e434291a439b65f6eb381b741edf3

    • SHA256

      5302c416b0abd845fe3145f910e82440588c11219940fe89fd68722260a9b508

    • SHA512

      0ad087c8a2290f890cb58535958566cf6a814415c58f20742d3074d27cd0e4e31f5f3d3a0a4945ec675c84ad99f9894c184ff69fcb702d19443a83729b19bddb

    • SSDEEP

      49152:VP6hSrcCPT0J6Lg31+mYGnKDVTXShVr7oL:2ujRmYGnKDVTOr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks