General

  • Target

    02102024010201102024ShippingdocumentsBLCIPL.pdf.rar

  • Size

    751KB

  • Sample

    241002-jpsvlsyemd

  • MD5

    380796d512f67990a943b577d6c23419

  • SHA1

    64481bccd48226fcc634cf391c3be03c0c53639e

  • SHA256

    5b4afa4cfcce54475328d7f8b52bbedf094e14be9d9b06f5a1822e70a5aa2a6d

  • SHA512

    9189a3d63bc366e8db82cca610b0ea27d1f8d82eb56f812072d72ddf356269ba3c826c732d06a49437cf3ea53363798e89a71f3f407e8d71a8c4cada00bc2890

  • SSDEEP

    12288:gyC6wuynDD3Npmb1FxtqGwoJKdaYwEx1qV+fpppXOuGZVa41hTM7aNiWjL933Ge1:gyCXgrNnJKNqV+fprv41aeL93xQZg

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Shipping documents BL, CI & PL.pdf.exe

    • Size

      811KB

    • MD5

      a66520a932198c68fc0df0423e2c046b

    • SHA1

      d49acc9ad7e386a48d83d0bd334294b4168e21fb

    • SHA256

      40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369

    • SHA512

      543ae2fa9923a599d55f0ec74f4eb2dd724209e83a5cb285fe19d40655ed8901c810013c6ba593cf55a7626cc120fdf5815a1eaa9e61ec071b2190f0b4f55f32

    • SSDEEP

      24576:qD0tM85tbNJjldeYiYHkOtw0BH2Hmpp68BMQaV6/778:qD0tM85DJjl/iW1tpBFpp6Ha78

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks