General

  • Target

    Enquir002,pdf.7z

  • Size

    414KB

  • Sample

    211203-tf47dshaal

  • MD5

    f506bdae818f6ffeacb5e47635ffa1b1

  • SHA1

    6824d3ec2b4d0a36e2318509d291109a7ecf824b

  • SHA256

    4806ddaf7cbad4917ca57a3f37c0fe990607bd8e2c111f070476346374b315e7

  • SHA512

    a735a689d49dd4037962e42880e61ba9d3597c075603e7dd0c270f34f2b97f7f3d94dbd8148248d29b94c97f16082531e02a787c8dbcb1aa61187fc38a69cca1

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.devmetsan.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Murat2019*

Targets

    • Target

      Enquir002,pdf.exe

    • Size

      463KB

    • MD5

      69f985ebd82e4988d25630542527eeae

    • SHA1

      9d2781e21779f1a7b2f0a8bbb4354b6a7471c394

    • SHA256

      5a752626283f4d935d97c24abec8d829f7c3f69a97a5a423ab5ce3cd4e2446fb

    • SHA512

      5b4bab6a78fc88e2aebfc5c49a3a9944c2286ef0afc3f7a7ae16032f8ba433269cfc197eed5a20801551b0fd1b97d6af4dba08a2e9d2f253d6bbaf0a519273a2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks