General

  • Target

    97b45eb247e2111c62c265af0722b90706db3320c65e99e7746ac2686ae71a16

  • Size

    379KB

  • Sample

    220521-cyq9taefg3

  • MD5

    2320def1c340715432d51fcfe1403051

  • SHA1

    09cbf2bd6e254aed1223f338a3aa6de92465e60e

  • SHA256

    97b45eb247e2111c62c265af0722b90706db3320c65e99e7746ac2686ae71a16

  • SHA512

    f2ce22bf72cf90414564a382b3bd1619a7c6be9b28fd8f656f1265e74bee0a1c5494483b733c0b9972456698651ea57cfb6ff646fabce9acc710fbbda9cc0673

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aquariuslogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AQL@2019#$

Targets

    • Target

      PO.NO.062.jpg.exe

    • Size

      421KB

    • MD5

      458145b74718d73399391f3cd02e6192

    • SHA1

      058788cc18f08f58e4104e33b9546f91053102f3

    • SHA256

      008d79b95dd17c51b103bf87aabf1e5a3ecff06c2ff26a5b5bce23ac1e0dda9c

    • SHA512

      e44d1fea9445603417ede137eb38462d47b63c035ed9bd81b1c901fa6d98594c54dfb16fee48f7deccad8086b107af7d664e604dc8cce64ee9781aa5d08cae68

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks