General

  • Target

    9ffd774ffa639b926288eab6adafd991d3878fe58b5b17f27c76ed74c0f3ea96

  • Size

    473KB

  • Sample

    220521-abqnnacgfp

  • MD5

    38ed19d73af4f08795c9c6e10ab4b761

  • SHA1

    d764a84a3a80cbb58e2982c90c0398e49ca6699c

  • SHA256

    9ffd774ffa639b926288eab6adafd991d3878fe58b5b17f27c76ed74c0f3ea96

  • SHA512

    9871a6ea4bd4e13746adde71fad223dcc0dd6e93790e4784ede7f6a7fe88d4a47a79c00e5433a2048523585012619c24962f4ac185f01d7d183a58b2b37afb3b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aquariuslogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AQL@2019#$

Targets

    • Target

      FIRST PURCHASE ORDER.exe

    • Size

      733KB

    • MD5

      7049a8a60d535e335ad3ba4f32ac5b14

    • SHA1

      a41c7239026a2820c2e79fa2b3e9e29194517c17

    • SHA256

      40a33fa7eeec1caf0ee27f87a4c3d8fd8f1475789191a1693329e2fa154b02a2

    • SHA512

      9755c2f86e208fdf9a6440cd2d1ad8c41e84425d55894d85a03b867c4a7a4ee76f7dfeee08881a1c2ea57ac1f64d1561db268be13349524d63b9cf5a72d8aec0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks