General

  • Target

    d1c344f6235301f1e7da7c9b0ff6464f2f9e20ed9a0e8d8c178199d644c69912

  • Size

    395KB

  • Sample

    220521-ch8h6adhh4

  • MD5

    51ae23aab9adfcd32394dde4d8d27e9b

  • SHA1

    c4b134f7e847c2347ba6a89374c7c6569340ee72

  • SHA256

    d1c344f6235301f1e7da7c9b0ff6464f2f9e20ed9a0e8d8c178199d644c69912

  • SHA512

    f2fc96c662047ae7df9c75d08d74006790ae1a6830fbc61b519aa09375f8c3e215035aca4746284da061b6b0dcbeee602067ef8f793448e5948f72e042eaab20

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pptoursperu.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mailppt2019-

Targets

    • Target

      items 001.xlsm.exe

    • Size

      488KB

    • MD5

      35f182cd6015448d90271bae97b6e48e

    • SHA1

      f1bd8aa2087b48458741afb60529b39c3b167034

    • SHA256

      6f5b0135a9800946845f48fdd84ab322ca4c4c5c1efcb79fcf82969f76099886

    • SHA512

      7b6e3d4ed0cab1d8e61d972ddefe0dd72c95bb49c680b9e42fda65907bd708d792c47c853d80e969230fd1600e11bdc62f22e9c9d302732f680fdd5c47fe3f29

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks