General

  • Target

    8a98251d21737443a4f65476f3e460569431094581b8a458b0a1bbb06f358114

  • Size

    384KB

  • Sample

    220521-n4rnbaefb5

  • MD5

    78e638cd559da8a99e7b23ea03667998

  • SHA1

    33e8b94d9f2b27543baaede37a3021238ddca423

  • SHA256

    8a98251d21737443a4f65476f3e460569431094581b8a458b0a1bbb06f358114

  • SHA512

    ed1cf40c2022e1737a91c5cf52d295b29107419ff791122b83d83008de2820896961a12d9731c253abcf2d69c7d32ae37e39e78109a6bafa5eda6a3d45780077

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rajapindah.com
  • Port:
    587
  • Username:
    rizky@rajapindah.com
  • Password:
    #r4j#citeureup#13

Targets

    • Target

      New Invoice.exe

    • Size

      417KB

    • MD5

      ee2432ab09fc8dda38d558b392e68a71

    • SHA1

      b9b8f01054cc7eac210012b7305c708a703960f4

    • SHA256

      78dc559f3c971bf8fe5eb3f669a3b8de8c18313d2c466916fc32fd27ea352700

    • SHA512

      66cbec40db972e9e27ffc1a74f7b59d3499736d8bd74a7822800e90d8f8d15438041c58b6b39d16f25e2cfb15d27f496642c10a26c8622d437d23056a0dd6833

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks