General

  • Target

    21e5714c80ac1434826b55931e58a1d8eb82d62970cfabb44a268d0adca87ecc

  • Size

    416KB

  • Sample

    220521-dwfkzabddn

  • MD5

    9a724cce9d88dd96508beff4ccb32f47

  • SHA1

    e46f86ed756c2c9b58c011495f65157b7d5274d4

  • SHA256

    21e5714c80ac1434826b55931e58a1d8eb82d62970cfabb44a268d0adca87ecc

  • SHA512

    e3f4236d09ba0219f6db69d994c6d54d1afa4b5ec39187c4cec9e5dfa17f4f7d326d51d160faf1d0a02ad701e90b2714cd7ab530d0d21b95179d0a17843ef038

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    cpcl27.hostingcare.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Standard123#@!

Targets

    • Target

      Shipment Notice.exe

    • Size

      471KB

    • MD5

      5246dcb8944246a4d922e39647ba6e34

    • SHA1

      51c412f7294013b83137ed5773652b80cb88c9d5

    • SHA256

      2c96b6799b4a15f6cd01ae6aabae3181b13d128b7b085854c77ee71253139040

    • SHA512

      7627724250c7ee7f0a1363bd467eaa291bd1909da5534935761f4c7cc5d0a1b1e961b1bcee0fe0199b3bbc99bd063cfd5e29206c65f4e8fe60d9adb6d5e26ca0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks