General

  • Target

    95f681200dfbd3eaf68c085f87e87ddf786a725ab31211227327b8a9566a1bfb

  • Size

    757KB

  • Sample

    220414-pwr5jsghdm

  • MD5

    dba310df7fa68c507ea725782f8498e7

  • SHA1

    e6594715dd314019785cfc40e609d65a7438a13c

  • SHA256

    95f681200dfbd3eaf68c085f87e87ddf786a725ab31211227327b8a9566a1bfb

  • SHA512

    c5a2acae1246ea0be0797af0a3bb7d97cf66c80046ce94652995c95826ff48e1d62856a4eab44101c5bb3010901764b206fffc3af35149211f6965c1cd242b2d

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    t$KMOPJ9

Targets

    • Target

      95f681200dfbd3eaf68c085f87e87ddf786a725ab31211227327b8a9566a1bfb

    • Size

      757KB

    • MD5

      dba310df7fa68c507ea725782f8498e7

    • SHA1

      e6594715dd314019785cfc40e609d65a7438a13c

    • SHA256

      95f681200dfbd3eaf68c085f87e87ddf786a725ab31211227327b8a9566a1bfb

    • SHA512

      c5a2acae1246ea0be0797af0a3bb7d97cf66c80046ce94652995c95826ff48e1d62856a4eab44101c5bb3010901764b206fffc3af35149211f6965c1cd242b2d

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks