General

  • Target

    Invoice AR20230714N.exe

  • Size

    1022KB

  • Sample

    230717-qvnleach9v

  • MD5

    5a15707348fe2b10d72b2214f9da79a5

  • SHA1

    eb64892227ac7fe63caf8f74d81e90601454fc64

  • SHA256

    f468e71c51b81601ee1c836199470b669e9c5dd83d931890b406dc82744bdd1a

  • SHA512

    1df278f1d9c509638d9e7792dbb1ff8a6916616880afd17ac30c9fcc125fe8eeb7488d5178cc7ccba3f51ceecbd0b518f6cca5fe70fea8f806d1d31608ae23e1

  • SSDEEP

    24576:7gynjGJDNUa3EIZ9m3gZl1tt/XTFz7N5FHH+HHHHHWHVHCUXGHnHHhHraHoeXO:je5T5//XRz7rFHH+HHHHHWHVHCUXGHnt

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    webmail.mdist.us
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yanin#4321

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Invoice AR20230714N.exe

    • Size

      1022KB

    • MD5

      5a15707348fe2b10d72b2214f9da79a5

    • SHA1

      eb64892227ac7fe63caf8f74d81e90601454fc64

    • SHA256

      f468e71c51b81601ee1c836199470b669e9c5dd83d931890b406dc82744bdd1a

    • SHA512

      1df278f1d9c509638d9e7792dbb1ff8a6916616880afd17ac30c9fcc125fe8eeb7488d5178cc7ccba3f51ceecbd0b518f6cca5fe70fea8f806d1d31608ae23e1

    • SSDEEP

      24576:7gynjGJDNUa3EIZ9m3gZl1tt/XTFz7N5FHH+HHHHHWHVHCUXGHnHHhHraHoeXO:je5T5//XRz7rFHH+HHHHHWHVHCUXGHnt

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks