General

  • Target

    8486725974.zip

  • Size

    64KB

  • Sample

    221202-lmh9haha8w

  • MD5

    409a409bd1dcde20cffddfb185f0767c

  • SHA1

    424dc688bea7b95233590c5854615efd6d9452de

  • SHA256

    3ead777429e7188adb1af32c4325e9dffea74bd5d4aa3c8d378278b8837d2732

  • SHA512

    8348c8e3a24cc88133a85c69408f6211768212a193438464061008117e575e3cc4c9bf07f4935586adb1a69e589397a883d09c7a1794ee753da854aabde452e1

  • SSDEEP

    1536:wYFteU25FOpokjnyOQ7Kmx/5tv7Vcf6iVaIKYiW:wYzeU2WGwQ7KmdTT/WkS

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    host39.registrar-servers.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    payment 12345

Targets

    • Target

      db31771b423567e0dad13e11ec3ab7eaa2c1ffc4d7c0adad61df5366582e01f0

    • Size

      251KB

    • MD5

      663302eb9943f93b672d0b4bda82d483

    • SHA1

      93554cdeb1362f193ff3d96ffa6691f2941bbc90

    • SHA256

      db31771b423567e0dad13e11ec3ab7eaa2c1ffc4d7c0adad61df5366582e01f0

    • SHA512

      2e968ff87dc9c64b920dbf5fd0063b998dbf3827c0b306f6e918caa33c4ce46ac20b70d821d54a64d9a69c8df4ded7119f986ad2f583bc83bab91b22fa5b22fc

    • SSDEEP

      6144:l2Z+RwPONXoRjDhIcp0fDlavx+W26nA/0mGZmo7ky:

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks