General

  • Target

    https://firebasestorage.googleapis.com/v0/b/droid-21a46.appspot.com/o/VBS%20NO%20STARTUP.vbs?alt=media&token=9c52f2bc-e540-47ee-a7b1-677585deacca

  • Sample

    230330-z72hgaec62

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.sisoempresarialsas.com
  • Port:
    21
  • Username:
    cousin@sisoempresarialsas.com
  • Password:
    _X@Y2JZ!+7b+

Targets

    • Target

      https://firebasestorage.googleapis.com/v0/b/droid-21a46.appspot.com/o/VBS%20NO%20STARTUP.vbs?alt=media&token=9c52f2bc-e540-47ee-a7b1-677585deacca

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks