General

  • Target

    DAIMON SWIFT 25-02-2021 -.doc

  • Size

    740KB

  • Sample

    210226-ydb51n1xd2

  • MD5

    f556e94a8fe233d397c37c1bd65eca78

  • SHA1

    784969f871b49ae0ff3ad76dc331950bdbbd39bc

  • SHA256

    d897f9f36f09b0e3618b0ed8387a4e7e45a0c154959f4d5cb9b8d8cb136892a5

  • SHA512

    761c019df1f1e1f038018eb1538e1e21c2daca7c283e6a4e13c0103903bf3533202c66a2b61647a559fdaa6bfd6eaec7e7ac640d41e35c61d77252fda93867f5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.microhydrotechnic.co.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    saibaba@1974

Targets

    • Target

      DAIMON SWIFT 25-02-2021 -.doc

    • Size

      740KB

    • MD5

      f556e94a8fe233d397c37c1bd65eca78

    • SHA1

      784969f871b49ae0ff3ad76dc331950bdbbd39bc

    • SHA256

      d897f9f36f09b0e3618b0ed8387a4e7e45a0c154959f4d5cb9b8d8cb136892a5

    • SHA512

      761c019df1f1e1f038018eb1538e1e21c2daca7c283e6a4e13c0103903bf3533202c66a2b61647a559fdaa6bfd6eaec7e7ac640d41e35c61d77252fda93867f5

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks