General

  • Target

    d4803c82bdc773474dda976fa30bc7fbbad2a6192af850c71602419dd500368b

  • Size

    475KB

  • Sample

    220521-n5kw6ahgfm

  • MD5

    68a0f1c0fbbdc5014c8814f20b0d0784

  • SHA1

    54bf373d1460da8e3ae153a0694dae77fde9f1cb

  • SHA256

    d4803c82bdc773474dda976fa30bc7fbbad2a6192af850c71602419dd500368b

  • SHA512

    6daf2572ed2e47d62f1a9540d48b242b16adbf281c2c8fa5bc765962c3f576107a91c8a80c4feaecf5abb461dbd1e65f7a0efbfe44bf441c0a785fe9c22576b9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.villanika.gr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    n2^-9wE@Wl}t

Targets

    • Target

      new purchase order.rar.exe

    • Size

      523KB

    • MD5

      e50b58922768f36a719aa5e91c086c06

    • SHA1

      f2216e02ce43d07bc6bc8b7fb01461f1d9d1aa91

    • SHA256

      a4d3085a47bf0da4fa557e18de19bada74667d0eaa3dca959990b96215bb25cc

    • SHA512

      ba6be2906587a73203196853952878e017e99ad94edec3195a368edd99f9fb0c2ae3218b84bd943a57f0cdbbd340043c0858b9e050f330dbacdf26b45f32d078

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • SnakeBOT

      SnakeBOT is a heavily obfuscated .NET downloader.

    • AgentTesla Payload

    • Contains SnakeBOT related strings

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks