General

  • Target

    a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec

  • Size

    479KB

  • Sample

    230823-my8h7sbf32

  • MD5

    eb6376ea1772ae9f2849f268a395d990

  • SHA1

    d686e6b17530e2e266ecab6ff85b12f3b1cdc58f

  • SHA256

    a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec

  • SHA512

    85609872d66d18c0ebd4bfabcf67e7b1a7934bfb3e83fb24373e3ebb7e09fa7752da91d6b1567ed98db88fd44298f9ea8c796a37c61335eeee82d29443a35dfc

  • SSDEEP

    12288:3D8UGypISTAd+CFTbmDcMr1Of6f2LO0E+tD+kv:3wUVpIwfCRiDcMr1ykcO0TDz

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hay-tek.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Hytkmk142+

Targets

    • Target

      a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec

    • Size

      479KB

    • MD5

      eb6376ea1772ae9f2849f268a395d990

    • SHA1

      d686e6b17530e2e266ecab6ff85b12f3b1cdc58f

    • SHA256

      a47c1485f55f17b214f93da9b1235026dfa4e963f2a47203118491546d74e2ec

    • SHA512

      85609872d66d18c0ebd4bfabcf67e7b1a7934bfb3e83fb24373e3ebb7e09fa7752da91d6b1567ed98db88fd44298f9ea8c796a37c61335eeee82d29443a35dfc

    • SSDEEP

      12288:3D8UGypISTAd+CFTbmDcMr1Of6f2LO0E+tD+kv:3wUVpIwfCRiDcMr1ykcO0TDz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks