General

  • Target

    40544ec4e1b5b8ec2c78ef66bd65b5089646087f0f77b5c803e478f0765e4b8f

  • Size

    54KB

  • Sample

    210505-vq8vaf2wn6

  • MD5

    b44c460bf94c90fd4e249210d6a33de6

  • SHA1

    e84b6d6bff21613eec6dfbdb945f50af00923285

  • SHA256

    40544ec4e1b5b8ec2c78ef66bd65b5089646087f0f77b5c803e478f0765e4b8f

  • SHA512

    ec860a9a6296adbb074907a79708490845f34dfc85325a242598cc2c222034eff10abfdaf91d98b30f232dbf620042192bba59febad54a5d96ac2b7689878c72

Malware Config

Extracted

Family

agenttesla

C2

http://103.133.105.179/1919/inc/d08414f02917b7.php

Targets

    • Target

      40544ec4e1b5b8ec2c78ef66bd65b5089646087f0f77b5c803e478f0765e4b8f

    • Size

      54KB

    • MD5

      b44c460bf94c90fd4e249210d6a33de6

    • SHA1

      e84b6d6bff21613eec6dfbdb945f50af00923285

    • SHA256

      40544ec4e1b5b8ec2c78ef66bd65b5089646087f0f77b5c803e478f0765e4b8f

    • SHA512

      ec860a9a6296adbb074907a79708490845f34dfc85325a242598cc2c222034eff10abfdaf91d98b30f232dbf620042192bba59febad54a5d96ac2b7689878c72

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • AgentTesla Payload

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks