General

  • Target

    396f3200a662d0bb44c36326b2501aac7eddb8117b78c956d1569a9d1e83729e

  • Size

    431KB

  • Sample

    220521-ct1bxshefp

  • MD5

    c4996221c4549bc88d77fd2f265e6a13

  • SHA1

    8516f1e99b52e4f22f3c4ccd75d7858c669375d5

  • SHA256

    396f3200a662d0bb44c36326b2501aac7eddb8117b78c956d1569a9d1e83729e

  • SHA512

    953f70203797dc35b9bc1e479baf25d417674dfc6c36fc6325caf7f54bfcbb81633b15849efe4c3ee4277b3d1873abf4325bf3c38fb159ee4b036c976726dafe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    z123456789ok

Targets

    • Target

      396f3200a662d0bb44c36326b2501aac7eddb8117b78c956d1569a9d1e83729e

    • Size

      431KB

    • MD5

      c4996221c4549bc88d77fd2f265e6a13

    • SHA1

      8516f1e99b52e4f22f3c4ccd75d7858c669375d5

    • SHA256

      396f3200a662d0bb44c36326b2501aac7eddb8117b78c956d1569a9d1e83729e

    • SHA512

      953f70203797dc35b9bc1e479baf25d417674dfc6c36fc6325caf7f54bfcbb81633b15849efe4c3ee4277b3d1873abf4325bf3c38fb159ee4b036c976726dafe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Email Collection

1
T1114

Tasks