General

  • Target

    128c4f65460a7f4bda3b0eb0dd712fb5d4f2416f0dceb9c5f1450c8a0e90dcc9

  • Size

    398KB

  • Sample

    220521-dz43qsgfb6

  • MD5

    883cf18ed393f74b3ffc763a5806d1aa

  • SHA1

    1578578577b3ef35c92b4a4dcee05390a1697180

  • SHA256

    128c4f65460a7f4bda3b0eb0dd712fb5d4f2416f0dceb9c5f1450c8a0e90dcc9

  • SHA512

    3d097917ce70c4a63ecd3d4e6cc10746a6300f173b07987c36a85294c639911194492935fc49d2b9e7b7946ebc1cd3cbd4956ada4980b4c02828324c1a3bf865

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pptoursperu.com
  • Port:
    587
  • Username:
    info@pptoursperu.com
  • Password:
    mailppt2019-

Targets

    • Target

      PMR#RFQ_PRICE.exe

    • Size

      453KB

    • MD5

      0e4fb8706e3ca9107418ed4eafa7964d

    • SHA1

      fb9eabee69465bcb99d693aeb702c176a164e115

    • SHA256

      f982ec93d003591286335c98074fdbe2054d603de5211af961c670f50ac3437d

    • SHA512

      c0f3b96eb96f99aa7735bffa78be3c2523ee50acd0535c3a0dd14dc42a8d7a21bd6d1298b5677347a8ca793aa79637dbebcc098c3c11700cd9564e5b05c40d2b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks