General

  • Target

    0b4fc883a3ab24b0c65a8d19dedafeac5b1c1ca357f4154317ada9517c593b84

  • Size

    560KB

  • Sample

    220414-hp2l3saeap

  • MD5

    f4f01da885c52a682060607332aaa4a0

  • SHA1

    134f77704bc306a95941309d63e5b6e66dd48c13

  • SHA256

    0b4fc883a3ab24b0c65a8d19dedafeac5b1c1ca357f4154317ada9517c593b84

  • SHA512

    7515446df9828f93579be38d095f5117c8b470cac0449f1fd848eef82b15a1db318b6d685647f627bc2c50bf59b845062f325287c91a125a691f9445e186c43a

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cl-logistics.vn
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zG@.]Zj4cRxA

Targets

    • Target

      0b4fc883a3ab24b0c65a8d19dedafeac5b1c1ca357f4154317ada9517c593b84

    • Size

      560KB

    • MD5

      f4f01da885c52a682060607332aaa4a0

    • SHA1

      134f77704bc306a95941309d63e5b6e66dd48c13

    • SHA256

      0b4fc883a3ab24b0c65a8d19dedafeac5b1c1ca357f4154317ada9517c593b84

    • SHA512

      7515446df9828f93579be38d095f5117c8b470cac0449f1fd848eef82b15a1db318b6d685647f627bc2c50bf59b845062f325287c91a125a691f9445e186c43a

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks