General

  • Target

    e17380b6843421f15eb76b717c3b16bc092941d1d95914c88e9d1635c4d5eb90

  • Size

    638KB

  • Sample

    250107-bd52ssymhr

  • MD5

    7feccbd41399929021dc8bd0f8e80ce6

  • SHA1

    1439c24d5be04ac690d82d5f54ac211022a85627

  • SHA256

    e17380b6843421f15eb76b717c3b16bc092941d1d95914c88e9d1635c4d5eb90

  • SHA512

    3925bf77024728323f070f8075de77790cf6c0693709c68acc9d5c68dcd1c16383c9c2eb3158aa633050da6caf4fcc09b25f3f27912644f89ac822173b17a696

  • SSDEEP

    12288:4O4vqUDgHwLTfeBE/25kG5n2t88Lxi7XWnrhUe8tq/jMlwzFZRN4OJzYMUDd6:/UkHGfeu2F5+88yX4UoLMuzF6OJN8d6

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5332853472:AAHdywgWGa_Sq-P5gn5a5U2a1mM20putFi4/

Targets

    • Target

      revised New order pdf.exe

    • Size

      811KB

    • MD5

      e96ded9d27ec1a49f1c8cb0035ab088b

    • SHA1

      5b7e63a762eb0da3c36bacf9076b42db9cd49a8b

    • SHA256

      4583e8bd3dc0aae3312813a57cd4a2ab4c1545a3855ce0b4d6e4914a07217569

    • SHA512

      d67917bb819697850ff510cb17e81aff970b9b5a93ed048982b2b37869779532fda9862bbe488e1b13a0edb30ad6cbd62eafc6eb4672c20b7f1209a20eeae5bd

    • SSDEEP

      12288:YgsDoOIlCJ3yXSl9rbOVaU/VQi+gC3OtsJAS8HnLrAss9DWdMxGkR:JfE8SlhbSQi8p8HnwsyqMxd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks