General

  • Target

    3f726e7e27cab2febb3921fc3b4cd58312a7a394cb63fc5f59283654e27c88cf

  • Size

    572KB

  • Sample

    230306-dhndnahh5s

  • MD5

    6bca96125423b79fe048dcbc58624e5f

  • SHA1

    df9420a48516ed1b678705b13788b684e9eb7faf

  • SHA256

    3f726e7e27cab2febb3921fc3b4cd58312a7a394cb63fc5f59283654e27c88cf

  • SHA512

    a9a61235e6890b909151f1e82accd2c0ccca1304a1cd50699ce29df956a9e9855abb25268b070247206db9a37caf65d4b792ed10c71a8c81197839aa2c5fa7ab

  • SSDEEP

    12288:2KuPb+HT0qE8S6S7ztLHKNu+A+/1bILFv/uZb0MbVOboswfRaI1TQ/gYb:2Hb8vOztLHKNu+A+/1bM1/ibTOboT6

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      3f726e7e27cab2febb3921fc3b4cd58312a7a394cb63fc5f59283654e27c88cf

    • Size

      572KB

    • MD5

      6bca96125423b79fe048dcbc58624e5f

    • SHA1

      df9420a48516ed1b678705b13788b684e9eb7faf

    • SHA256

      3f726e7e27cab2febb3921fc3b4cd58312a7a394cb63fc5f59283654e27c88cf

    • SHA512

      a9a61235e6890b909151f1e82accd2c0ccca1304a1cd50699ce29df956a9e9855abb25268b070247206db9a37caf65d4b792ed10c71a8c81197839aa2c5fa7ab

    • SSDEEP

      12288:2KuPb+HT0qE8S6S7ztLHKNu+A+/1bILFv/uZb0MbVOboswfRaI1TQ/gYb:2Hb8vOztLHKNu+A+/1bM1/ibTOboT6

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks