General

  • Target

    7d2975cc47779537d37f1f2a4c492e8b38aa2e3fe8afdd2da17d2e0861c4814c

  • Size

    395KB

  • Sample

    220521-c53w7afae7

  • MD5

    fb921a4bde561bbc6fb742227ca4aff1

  • SHA1

    96fbe19e6fb32f945ead29f9fec22289f0a834cc

  • SHA256

    7d2975cc47779537d37f1f2a4c492e8b38aa2e3fe8afdd2da17d2e0861c4814c

  • SHA512

    8c3aa5297f4f53fdc068a4fee0eb584db0cc228af3646a952af7625a4cf6171a8c3d722e8fac215c6479ee25adfb25476135a47903b69c78fc4a89b26e9d084a

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rajapindah.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    #r4j#citeureup#13

Targets

    • Target

      SOA.exe

    • Size

      488KB

    • MD5

      5e60ef56b469a00033010400dfd0b8a8

    • SHA1

      32995e5ad69e62e01512bbc90c163f1c7f1a8805

    • SHA256

      7da5b2a2701aa912c1e3b5d76bc926d9a446e6fcbd965bf2781d4653cc453d47

    • SHA512

      de95f417bb3fca636c52f12740324d57e6831a3bb94672b0cfe508db85eff2f2be6564fbafd76aa91809dce612bbb78f110f394ac859f44228838fa208eeb6de

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks