General

  • Target

    7eeb8828ee5ed169af5f8ce9cd07e6a4bc3fcb2e548e9e01378a02fbcee7c680

  • Size

    461KB

  • Sample

    220521-n6j19aefh5

  • MD5

    88f7dd8dc78807b8a93c7a65d473b999

  • SHA1

    9596827fed499ad9a3cc4524c44e63fea38ab87f

  • SHA256

    7eeb8828ee5ed169af5f8ce9cd07e6a4bc3fcb2e548e9e01378a02fbcee7c680

  • SHA512

    82554a66c2d9f730740ed7c3fc506fc344d96cf79e67108f1e52e64a56362485532a36d6cd65fdbcc8fcfa1e6d31667a3510373f331c4a7e39d557ca66f70519

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mentorpublishing.co.ke
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Sam072493

Targets

    • Target

      PURCHASE LIST.exe

    • Size

      509KB

    • MD5

      84bd92a1862e1c85ce69e671f74fa6e1

    • SHA1

      7fa8144f716efef6b201b12672aa21882f6e1428

    • SHA256

      07d6953a68436385a5c78086ae9cf68fb5f5e44adeb6333f84aaa0ffd94a0ed5

    • SHA512

      ae488f9a861febe9fd96b9b44e8faf91cf8dc2c2a49f32e400a7b6e58a68a46a75a640a64985ba47818af21e7687be43676616ca7d788a71bb4f80cd5c33da04

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • SnakeBOT

      SnakeBOT is a heavily obfuscated .NET downloader.

    • AgentTesla Payload

    • Contains SnakeBOT related strings

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks