General

  • Target

    3a9f3bff649e255673885bffc1808ad8a5400592407e41404ced1743b8763ee4.exe

  • Size

    639KB

  • Sample

    221127-wfb7qabc8v

  • MD5

    6c53fc85e9ac65ba222d564a1bc31922

  • SHA1

    c7bc5547c850c8c21079a802e9058f9fd1b83a56

  • SHA256

    3a9f3bff649e255673885bffc1808ad8a5400592407e41404ced1743b8763ee4

  • SHA512

    645876094f05af1f91bb3107188c1abf41c50f451e2fc81dec4368ff1f5f11f7e168a53ffa43bb927f84567953d1c16623b503f52457b278ca21ec2eacbaebf8

  • SSDEEP

    12288:+SRmjI4BEpkABfUnx6sQqFuI/3xhS8Dfx0551WHG2gQVTVn:F/4skuUBQqFb3xrDfmgSUF

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    host39.registrar-servers.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    oluchukwu554

Targets

    • Target

      3a9f3bff649e255673885bffc1808ad8a5400592407e41404ced1743b8763ee4.exe

    • Size

      639KB

    • MD5

      6c53fc85e9ac65ba222d564a1bc31922

    • SHA1

      c7bc5547c850c8c21079a802e9058f9fd1b83a56

    • SHA256

      3a9f3bff649e255673885bffc1808ad8a5400592407e41404ced1743b8763ee4

    • SHA512

      645876094f05af1f91bb3107188c1abf41c50f451e2fc81dec4368ff1f5f11f7e168a53ffa43bb927f84567953d1c16623b503f52457b278ca21ec2eacbaebf8

    • SSDEEP

      12288:+SRmjI4BEpkABfUnx6sQqFuI/3xhS8Dfx0551WHG2gQVTVn:F/4skuUBQqFb3xrDfmgSUF

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks