General

  • Target

    124d3330_4829.124d3330_4847.pdf.exe.zip

  • Size

    656KB

  • Sample

    240930-s1ydxasgmp

  • MD5

    9d3237f33fb3370dcfb72a872caabca8

  • SHA1

    58d0bb5c0d9b2f33d214f8ff718954befd275846

  • SHA256

    56ee53a3b810d8c73b68466a4a716545c2a4a5c1e2b6e0e9b024e356d1dcae94

  • SHA512

    6dd36605e0cd9835f15f06046086a6caa1dcc442427d6b376e757a2fc748deb0a8379189ba09650202a7f38659c3054789dbe9109a2859b7381f7fd36cd0eece

  • SSDEEP

    12288:yVtsYNCcPAPKkLK7+zvu0bKf8dgGA33hmiVAQkHlyY5C+8J2r:y7beLazig9PbkH4kC+8s

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.musabody.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MUSAbody_victoria2018

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      124d3330_4829.124d3330_4847.pdf.exe

    • Size

      766KB

    • MD5

      61cc67fc6107f2cc08444d2ad64912f8

    • SHA1

      356e95d3e1814859418a9bcad93508abb1309211

    • SHA256

      c7ee9124f10a69564f9f096cc641aaf1c005a5270c8b62781ab71ced91a941d2

    • SHA512

      f5afbff46989909790a7f2405af8e7010e3e5dac7dfac001e2d68d84215240a0b86a6f56ccf7a286509632de3bd96fb8d6d6c8624f75211c2b671e4678d00fd5

    • SSDEEP

      12288:G1ZF8K63T4C1YD9avcgbjy37yeWG2tDpmAxRa4frkbKBRnvP9:GyMKdyz5WFxJDkbepP

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks