General

  • Target

    Receipt..exe

  • Size

    889KB

  • Sample

    210721-vxhk1xqxse

  • MD5

    6393d967302f542e074c717e44aa0650

  • SHA1

    9d414bbf84e7c8d670f16e58cfeafa15a539b2bd

  • SHA256

    a2f08d29bb884b329c3d0379d8c700622a913cefb97608ffee6e5dfd4513ede1

  • SHA512

    2f524745837b0c0827f1565adbf75ced090bc249e6fb8e5a2626601470535909aca5d95d700c822df0f2ba21dbda9c7476920c459bee6f5803f5670090bb021b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ombakparadise.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    eng!@#paradise

Targets

    • Target

      Receipt..exe

    • Size

      889KB

    • MD5

      6393d967302f542e074c717e44aa0650

    • SHA1

      9d414bbf84e7c8d670f16e58cfeafa15a539b2bd

    • SHA256

      a2f08d29bb884b329c3d0379d8c700622a913cefb97608ffee6e5dfd4513ede1

    • SHA512

      2f524745837b0c0827f1565adbf75ced090bc249e6fb8e5a2626601470535909aca5d95d700c822df0f2ba21dbda9c7476920c459bee6f5803f5670090bb021b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks