General

  • Target

    08012025_1011_06012025_proforma invoice pdf.zip

  • Size

    643KB

  • Sample

    250108-l8d7nsvrbw

  • MD5

    2daa2272f18623da04771d956f017a06

  • SHA1

    ef8469272bac0fb9c8b932548d4d5b36ea1bade9

  • SHA256

    4bb3f92934e8d3c04d4c83f49ae0e8f43a1e2e491d508d79e298f960c565513c

  • SHA512

    742584fdaddcae19cde3d7a4e10eb3fff2cffb91fcd0ddd048afb1df81310c06212f2460e9bcef48533a441042f7dda00a454b56e547aebff3716e67edbf7d02

  • SSDEEP

    12288:BWrGBq6JJy1SllvhojaMlVwE+6i30tsVA4O3bjX06s9dWkjA:WGo6GSlRhEwEoFO3bY6+e

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5332853472:AAHdywgWGa_Sq-P5gn5a5U2a1mM20putFi4/

Targets

    • Target

      proforma invoice pdf.exe

    • Size

      811KB

    • MD5

      e96ded9d27ec1a49f1c8cb0035ab088b

    • SHA1

      5b7e63a762eb0da3c36bacf9076b42db9cd49a8b

    • SHA256

      4583e8bd3dc0aae3312813a57cd4a2ab4c1545a3855ce0b4d6e4914a07217569

    • SHA512

      d67917bb819697850ff510cb17e81aff970b9b5a93ed048982b2b37869779532fda9862bbe488e1b13a0edb30ad6cbd62eafc6eb4672c20b7f1209a20eeae5bd

    • SSDEEP

      12288:YgsDoOIlCJ3yXSl9rbOVaU/VQi+gC3OtsJAS8HnLrAss9DWdMxGkR:JfE8SlhbSQi8p8HnwsyqMxd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks