General

  • Target

    e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0

  • Size

    756KB

  • Sample

    220414-pv3jwsghbk

  • MD5

    f102830b868ee3c2a5c50831d0848052

  • SHA1

    6040522ab7642bea1555995c7b43906dcee46173

  • SHA256

    e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0

  • SHA512

    b77c2fd5bc2ec52064be214954e5010accfa785463cabca7ae2b07893f2541ca66b66a95cab9d32f90158dcf8244096051d6674e0f1020a2c9cab72523588df2

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mmm777

Targets

    • Target

      e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0

    • Size

      756KB

    • MD5

      f102830b868ee3c2a5c50831d0848052

    • SHA1

      6040522ab7642bea1555995c7b43906dcee46173

    • SHA256

      e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0

    • SHA512

      b77c2fd5bc2ec52064be214954e5010accfa785463cabca7ae2b07893f2541ca66b66a95cab9d32f90158dcf8244096051d6674e0f1020a2c9cab72523588df2

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks