General

  • Target

    643e04faf727ac5d82b999694d956ee3cba7f940db80e0a19741ded299333ebd

  • Size

    473KB

  • Sample

    220521-ap9cxsdedn

  • MD5

    c695c0e45750316677f7ad0ad991315e

  • SHA1

    d44fde3474f228ed37041a27dcc0390187613850

  • SHA256

    643e04faf727ac5d82b999694d956ee3cba7f940db80e0a19741ded299333ebd

  • SHA512

    d79f2a9aeef9be5ea496956caf244b49b94d363627eaa2052c9908793bc38b58cf1c5b56807f1b0fa4c90a60228a8455ed3f6b0b4f5a4be4f6482210d4d889bb

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aquariuslogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AQL@2019#$

Targets

    • Target

      SWIFT pdf.exe

    • Size

      733KB

    • MD5

      7049a8a60d535e335ad3ba4f32ac5b14

    • SHA1

      a41c7239026a2820c2e79fa2b3e9e29194517c17

    • SHA256

      40a33fa7eeec1caf0ee27f87a4c3d8fd8f1475789191a1693329e2fa154b02a2

    • SHA512

      9755c2f86e208fdf9a6440cd2d1ad8c41e84425d55894d85a03b867c4a7a4ee76f7dfeee08881a1c2ea57ac1f64d1561db268be13349524d63b9cf5a72d8aec0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks