General

  • Target

    d523fd0dbe2daaefc69c8cf403488c391bae37f7992999f973ad9aae0b6b7d31

  • Size

    986KB

  • Sample

    220414-pq7ytagfdj

  • MD5

    534ddc77f7ed6bf0b772408d30fd0677

  • SHA1

    c0ab134c8f28764d1013667e81cfed900f8cc3f0

  • SHA256

    d523fd0dbe2daaefc69c8cf403488c391bae37f7992999f973ad9aae0b6b7d31

  • SHA512

    99f45980e76e7f9a2e6442b1e1a21609ca1204018efee936b3f8ff4a44667c27a55a2a284b27b530d4505ceb9705720df9f10171a4bbe98f731ccfd717272017

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.zeytinpark.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zeytinparkbc07

Targets

    • Target

      d523fd0dbe2daaefc69c8cf403488c391bae37f7992999f973ad9aae0b6b7d31

    • Size

      986KB

    • MD5

      534ddc77f7ed6bf0b772408d30fd0677

    • SHA1

      c0ab134c8f28764d1013667e81cfed900f8cc3f0

    • SHA256

      d523fd0dbe2daaefc69c8cf403488c391bae37f7992999f973ad9aae0b6b7d31

    • SHA512

      99f45980e76e7f9a2e6442b1e1a21609ca1204018efee936b3f8ff4a44667c27a55a2a284b27b530d4505ceb9705720df9f10171a4bbe98f731ccfd717272017

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks