General

  • Target

    Request Quotation for Industrial Crane.pdf.exe

  • Size

    1.0MB

  • Sample

    250303-lv61javsev

  • MD5

    3117e1fea82124f77a69bb235980a466

  • SHA1

    6ec1f0dbee329f8b50b28e8db066ed16488dcf8d

  • SHA256

    08bb478cb1a7ea9b27e688cb320cafd8d91073cb220d3f956b5c135a50d26c86

  • SHA512

    07b927625a333f03aa034ae23e6fe702d4666cbdcbe1a0f05d42f94ace10141f7ad08cd998533342b6a1989469c6d6394673b92b3e4117131e80fd8ea1279524

  • SSDEEP

    24576:Au6J33O0c+JY5UZ+XC0kGso6FajkiRFijUMaLFIWY:qu0c++OCvkGs9FajkiRFcUMaFY

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Request Quotation for Industrial Crane.pdf.exe

    • Size

      1.0MB

    • MD5

      3117e1fea82124f77a69bb235980a466

    • SHA1

      6ec1f0dbee329f8b50b28e8db066ed16488dcf8d

    • SHA256

      08bb478cb1a7ea9b27e688cb320cafd8d91073cb220d3f956b5c135a50d26c86

    • SHA512

      07b927625a333f03aa034ae23e6fe702d4666cbdcbe1a0f05d42f94ace10141f7ad08cd998533342b6a1989469c6d6394673b92b3e4117131e80fd8ea1279524

    • SSDEEP

      24576:Au6J33O0c+JY5UZ+XC0kGso6FajkiRFijUMaLFIWY:qu0c++OCvkGs9FajkiRFcUMaFY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks