General

  • Target

    3b45aa04b89fb0138eb6e1854a34ab8f9fa1e1c22cdb504ee789d7358083452b

  • Size

    799KB

  • Sample

    230213-c4l72sac66

  • MD5

    67dfa246512220298042e1826309d5c3

  • SHA1

    73eb07fadfcc1d9c5b4ead9079e0b75647801c31

  • SHA256

    3b45aa04b89fb0138eb6e1854a34ab8f9fa1e1c22cdb504ee789d7358083452b

  • SHA512

    3006d90ced7d528302c2246282850652539be06bd32ca48e09b4c9cf954e4d85a39a6bc307f943bd17851e175b373490b60fc2c663ad0d9631eefecf9fab2c3d

  • SSDEEP

    12288:Mgud7wHPfivNP6bPS502hAyigJLD3lOX3mrd9GOMnWiAQ+Sl:MxS6Nh5D5RDRrd9sX

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3b45aa04b89fb0138eb6e1854a34ab8f9fa1e1c22cdb504ee789d7358083452b

    • Size

      799KB

    • MD5

      67dfa246512220298042e1826309d5c3

    • SHA1

      73eb07fadfcc1d9c5b4ead9079e0b75647801c31

    • SHA256

      3b45aa04b89fb0138eb6e1854a34ab8f9fa1e1c22cdb504ee789d7358083452b

    • SHA512

      3006d90ced7d528302c2246282850652539be06bd32ca48e09b4c9cf954e4d85a39a6bc307f943bd17851e175b373490b60fc2c663ad0d9631eefecf9fab2c3d

    • SSDEEP

      12288:Mgud7wHPfivNP6bPS502hAyigJLD3lOX3mrd9GOMnWiAQ+Sl:MxS6Nh5D5RDRrd9sX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks