General

  • Target

    e70576f1cfe270260ea3d0a953c93aa043760f71cecfe754bc75922d64952590

  • Size

    350KB

  • Sample

    220520-2rgjgaahcj

  • MD5

    c40e9f94a4622e16e7aeddd23b66c2dd

  • SHA1

    745b85832d44ce2907b794421819b74ac1e38147

  • SHA256

    e70576f1cfe270260ea3d0a953c93aa043760f71cecfe754bc75922d64952590

  • SHA512

    b86c997de724c753354d9d058559c5b737dad67ce20182335962f56980fc352fbc647a2d0fe660fac33db8321666191dcff98f09b0ec7683c062a3d975d0d99d

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.parshavayealborz.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    P@rshava123456

Targets

    • Target

      Order_01172305_pdf.exe

    • Size

      389KB

    • MD5

      4747f3b3a3564b5ea5c5ae0458e8cbdd

    • SHA1

      6fe111382094e485c5f4c94cee08326073326c9c

    • SHA256

      6fee5f036747f42839ee7df45c9f6480c9a5e7f3eddd546638f26858b2dc2276

    • SHA512

      99b7f8798c787a268f9b7e5facab12e4ac75bc0f60e38dde76a38338888340ad697d1e1fc7e8576364f026bfbdef27330b9324d079c7e3560b6443c123dabb1b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks