General

  • Target

    ez.Ps1

  • Size

    424KB

  • Sample

    221125-wqklvagh9x

  • MD5

    79e5aa477b91037f411652199fec4b47

  • SHA1

    4d68ed5dd420f2ac0a8b3a1f0f5ec33f2c605bf3

  • SHA256

    cb94129961f8d8a26ce13e84d199ea1733057adea3c0754abcf7310fa03443d4

  • SHA512

    d4dd01b5935d210437d33b4a01417dd05328eb4999e0ea325ac4bced2fc63ee2679f67979bff76cb790f3d8a21604edc4d83caf13b65f5448026198a78cbee21

  • SSDEEP

    6144:omGppOv8jvOtF7GryCNV81Q7NA4S6DCICQupftzJgEReLxqs2tZ4+:omE2c2tF7XCXRNNJfyftzJgyelqsH+

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.leonardfood.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    K@rimi95

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      ez.Ps1

    • Size

      424KB

    • MD5

      79e5aa477b91037f411652199fec4b47

    • SHA1

      4d68ed5dd420f2ac0a8b3a1f0f5ec33f2c605bf3

    • SHA256

      cb94129961f8d8a26ce13e84d199ea1733057adea3c0754abcf7310fa03443d4

    • SHA512

      d4dd01b5935d210437d33b4a01417dd05328eb4999e0ea325ac4bced2fc63ee2679f67979bff76cb790f3d8a21604edc4d83caf13b65f5448026198a78cbee21

    • SSDEEP

      6144:omGppOv8jvOtF7GryCNV81Q7NA4S6DCICQupftzJgEReLxqs2tZ4+:omE2c2tF7XCXRNNJfyftzJgyelqsH+

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks