General

  • Target

    comprobante de pago.PDF.bat

  • Size

    1.1MB

  • Sample

    210722-wn9vxnakms

  • MD5

    8b606ce363521b23c5db44784d3999c4

  • SHA1

    ec7ad43128b11370fc53d93573c65b6e5b048fcd

  • SHA256

    a2cb7106a55573bd7292b3bda6280a141c91e0e0fdaf4253f4f8e18b7127823e

  • SHA512

    fac927b712ac43c2cfe9d6c46ae189a1b41e1b0f85081f4379056de8a7c218d193da9e07a6a51ee1d451be74f894092a627b1d50e2dbc5e73ba5340a45132694

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    serv-10708.handsonwebhosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    icui4cu2@@

Targets

    • Target

      comprobante de pago.PDF.bat

    • Size

      1.1MB

    • MD5

      8b606ce363521b23c5db44784d3999c4

    • SHA1

      ec7ad43128b11370fc53d93573c65b6e5b048fcd

    • SHA256

      a2cb7106a55573bd7292b3bda6280a141c91e0e0fdaf4253f4f8e18b7127823e

    • SHA512

      fac927b712ac43c2cfe9d6c46ae189a1b41e1b0f85081f4379056de8a7c218d193da9e07a6a51ee1d451be74f894092a627b1d50e2dbc5e73ba5340a45132694

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks