General

  • Target

    Ffzhofyh.exe

  • Size

    124KB

  • Sample

    220522-f3z93abafl

  • MD5

    b5680d05c29db4aaac268573cd17a09b

  • SHA1

    ac7706d6bad227adb8259aed7993febf85b87ed9

  • SHA256

    2b3f4cc38db496db9fb26595087296fb5d9c0fe1114353ea8ffd8d4be1d5e4c6

  • SHA512

    0abf232463e18148f95f614048e96975674155fcdbed7d3c31f95ebb7fc7d6d36f5ebbc907952971496995535ff49c73509b31853dc9d0776bf62468a333cae0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.centraldefiltros.cl
  • Port:
    587
  • Username:
    droidyandex@centraldefiltros.cl
  • Password:
    icui4cu2@@
  • Email To:
    droidyandexreports@centraldefiltros.cl

Targets

    • Target

      Ffzhofyh.exe

    • Size

      124KB

    • MD5

      b5680d05c29db4aaac268573cd17a09b

    • SHA1

      ac7706d6bad227adb8259aed7993febf85b87ed9

    • SHA256

      2b3f4cc38db496db9fb26595087296fb5d9c0fe1114353ea8ffd8d4be1d5e4c6

    • SHA512

      0abf232463e18148f95f614048e96975674155fcdbed7d3c31f95ebb7fc7d6d36f5ebbc907952971496995535ff49c73509b31853dc9d0776bf62468a333cae0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks