General

  • Target

    d187c78ee3fb9751461fe0df53c768aeb8fc8b68e26e92ac04f7a40c1e21ac9c

  • Size

    538KB

  • Sample

    220520-3r4vfahdf4

  • MD5

    754be1870b3b6e2ed599059465165b35

  • SHA1

    3f2589d75416267b14121084aee21f9d59189c5d

  • SHA256

    d187c78ee3fb9751461fe0df53c768aeb8fc8b68e26e92ac04f7a40c1e21ac9c

  • SHA512

    939a6e3195a891e9d42f8f86ef6313552230d7249361851b3f9355fad3e3d1c348f25e4145a29f136090dfa94f9b757f7c312c88c22120b417137661c3a50991

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.varda.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    varda9997929

Targets

    • Target

      SWIFT.exe

    • Size

      1.3MB

    • MD5

      e07c6e6de63bdd8421c369c9a39037fb

    • SHA1

      480ea048101330927ce18c105c70a0dc4505a7fb

    • SHA256

      3638d193b36a335bb93dc5f978fb5dc35c23a73d0e6c62a4316181286dc3cb57

    • SHA512

      e82fda2359558e731db3fe83c8e6b2ec51f197efda9f8bd393e2978f414091faea4af92393463e4dada4c5c8fba3e77dbe47599a3b56548870c642b86b98ba73

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks