General

  • Target

    302814Q.xlam

  • Size

    684KB

  • Sample

    240328-h1zxmafc3y

  • MD5

    dd1745650a50384acb3e3d18f640f6ae

  • SHA1

    aa7c92503314baf176c6972fb0e9eb69eeac8ce7

  • SHA256

    777ffc7e8f61be4b407f8acf15f6338d6a299c8fa89284c62528b0c00d443ae1

  • SHA512

    d4a6e8f1e861a236898fcb41c15e7013263f7acb7e22f9f15c00661d4c4a91712c004c3dbe955bd9d98a9558a6818d6c2659af750ef28e42be43ed832d09dc01

  • SSDEEP

    12288:ninWwmPuLCPZs6cygqu3EYgH0eDpTjyLEu3oJDyIaj5LiuR:irCPkyzYgH0iwAu4J1uR

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.awelleh3.top
  • Port:
    587
  • Username:
    servermaly19@awelleh3.top
  • Password:
    &tif9QnG8%~R
  • Email To:
    maly98@awelleh3.top

Targets

    • Target

      302814Q.xlam

    • Size

      684KB

    • MD5

      dd1745650a50384acb3e3d18f640f6ae

    • SHA1

      aa7c92503314baf176c6972fb0e9eb69eeac8ce7

    • SHA256

      777ffc7e8f61be4b407f8acf15f6338d6a299c8fa89284c62528b0c00d443ae1

    • SHA512

      d4a6e8f1e861a236898fcb41c15e7013263f7acb7e22f9f15c00661d4c4a91712c004c3dbe955bd9d98a9558a6818d6c2659af750ef28e42be43ed832d09dc01

    • SSDEEP

      12288:ninWwmPuLCPZs6cygqu3EYgH0eDpTjyLEu3oJDyIaj5LiuR:irCPkyzYgH0iwAu4J1uR

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Collection

Email Collection

1
T1114

Tasks