General

  • Target

    c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef

  • Size

    966KB

  • Sample

    221130-p4xp1abh54

  • MD5

    f680cc7dbd073f135b1000fa9221c1a3

  • SHA1

    5dcc545fc1575a700b9b47084a70722c18d7e508

  • SHA256

    c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef

  • SHA512

    88711a963462f8e437e03e7ad786bff9b1635b8c8a89abebf82d1a255d24906b738dab53a0bd8e4ed5a9d9085f6ef350e5f4d44a639ead2ef72cbc2ab8422b61

  • SSDEEP

    12288:SpF4WDE6LoMbKAn6wRt+50pt78pUC8an8pUC8a4h1q9g19QQE7sRvp73yHHKCZa6:StoMbKK3Z8N8q1q9gYQE7sh5CnKCZH

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TvNyBPp9212

Targets

    • Target

      c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef

    • Size

      966KB

    • MD5

      f680cc7dbd073f135b1000fa9221c1a3

    • SHA1

      5dcc545fc1575a700b9b47084a70722c18d7e508

    • SHA256

      c5b473122b5ec75934213b8a425f168c924f3b4280f58bff452f5e135c79f3ef

    • SHA512

      88711a963462f8e437e03e7ad786bff9b1635b8c8a89abebf82d1a255d24906b738dab53a0bd8e4ed5a9d9085f6ef350e5f4d44a639ead2ef72cbc2ab8422b61

    • SSDEEP

      12288:SpF4WDE6LoMbKAn6wRt+50pt78pUC8an8pUC8a4h1q9g19QQE7sRvp73yHHKCZa6:StoMbKK3Z8N8q1q9gYQE7sh5CnKCZH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks