General

  • Target

    79092f23a261bfbeb3398707d48c1e5c230517d5258d3b82477450484a925577

  • Size

    389KB

  • Sample

    220521-n5wnnaefe8

  • MD5

    761a684e09f699bd8e130107a615acdd

  • SHA1

    ae8d934c8b10b796a73edb294518942e36b1bb18

  • SHA256

    79092f23a261bfbeb3398707d48c1e5c230517d5258d3b82477450484a925577

  • SHA512

    21b6460edbfb2551910188c7230de9771a9c0a9bc55275884e7ad3c0dcbd212f998de7e85593e91740fd9ff8c639628bcc8ddec537de8c10e29f04a7a283d067

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mkoify147@@@

Targets

    • Target

      IMG_0009786R445TGUH.exe

    • Size

      423KB

    • MD5

      f6cec1316813848e64a78fe3d6d29386

    • SHA1

      ee1422deba8ead728f95c22c2b0ccfb984c00c33

    • SHA256

      2b9ac04e330dd1d57544561da42bd8826c516e16b1acb6e70aa07d38f8152cde

    • SHA512

      174e73448b7a1d9002deb0957c33e5939601ba0c79038f33d00e16bf0548ffdbd0165754d52f8b830a517bc499c58e755d6926b902fc02225fbe63e488c208e0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks