General

  • Target

    492bdc3161c7e9cefe697097f98f90185a28ec08f7a633a357c24a8f7c18c651

  • Size

    383KB

  • Sample

    220521-awvhcaahc6

  • MD5

    dac6d5e9bb84537494c6e23c9279d0d1

  • SHA1

    79f7de8ef98a3ccf080bae5cadac7574cf382b85

  • SHA256

    492bdc3161c7e9cefe697097f98f90185a28ec08f7a633a357c24a8f7c18c651

  • SHA512

    bec458dc3ac542b39a5dc6b7ca163d4e07298730a3372078faa09da20bb95632742071fd4aa0cbf2895149d875c6caaf9e3ad45fbff80ec1c34bb996fc9ad8a3

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    challenge12345@

Targets

    • Target

      RFQ.exe

    • Size

      569KB

    • MD5

      105cc34e0dcb56a0bb61374f2e6eaae6

    • SHA1

      5e9dc5c0907fd3d4d3d3debc923b1715881da818

    • SHA256

      a4d604ac931839ec691dccc2474d80bf2f826693d4ce914a161a484288ebe20a

    • SHA512

      6133b8dc30fd532d585032acf515f49dce624139411a0c1879bd10a582a104743feed8d3c71523360c0e37d4bc5cc3141c7e1f0bc98f141010a7b127a20d6384

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • AgentTesla Payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks