General

  • Target

    4b6c70eb12ad86ec45007c685623446f62036ffcdf8a0616965dc7dd90f46c97

  • Size

    1.4MB

  • Sample

    231205-vsemyade56

  • MD5

    5e83b64135b00650af29e821b63e1140

  • SHA1

    3353f1016b3eff385bb6c9c8322c38b8465030aa

  • SHA256

    4b6c70eb12ad86ec45007c685623446f62036ffcdf8a0616965dc7dd90f46c97

  • SHA512

    b184c1ba9449b922732c4701a440ce4a2ebf7969263957b44f3cb630ba2b610dc0b0f468aa897448676d7b6acf001b07062af86ebb07adef9d552183e4fd42bc

  • SSDEEP

    12288:JWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:K34/up+pJHY9L+lQtsY21KCFfXNXL

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    webmail.vector-kl.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    IzzaVectorKL202)

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      RFQ_7993.EXE

    • Size

      827KB

    • MD5

      23284d731a5f245ed50c262c6bd783c8

    • SHA1

      ec77a6f42091861b7544d611d9b01d5c761c44c8

    • SHA256

      cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb

    • SHA512

      e62c33552d5f8e866c8b58a1cc5220c06c653b0dd32f8329b62716e81d2958edd734f4e85903e124db0589ed1bca6d9e695d5337ba80f7162ba14dec53eeec62

    • SSDEEP

      12288:YWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:534/up+pJHY9L+lQtsY21KCFfXNXL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks