General

  • Target

    2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53

  • Size

    1008KB

  • Sample

    240426-czex6shc7z

  • MD5

    5b2ecb3ca674c79176afbe7b3b81c764

  • SHA1

    a2f434515abc929f1c875b643546a0f2b710c27d

  • SHA256

    2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53

  • SHA512

    0a33277520c6485322c36085ee40b0079976a12080b90493ea1e76a08799a2c80c2efd8cdbf0d1e15b20a592ec91a24ec62ccf6f2a725d0efefd93455405627a

  • SSDEEP

    24576:MsP3gEmkXsrTpVdJdYJkO2pgTFC2kfOzTePapFNI09w1Q49OjZG:MWsrTTiMR2kfOQOLIsw1QTG

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.z2neumec.com
  • Port:
    587
  • Username:
    guido@z2neumec.com
  • Password:
    Gid@2021

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.z2neumec.com
  • Port:
    587
  • Username:
    guido@z2neumec.com
  • Password:
    Gid@2021
  • Email To:
    straitjohn249@gmail.com

Targets

    • Target

      2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53

    • Size

      1008KB

    • MD5

      5b2ecb3ca674c79176afbe7b3b81c764

    • SHA1

      a2f434515abc929f1c875b643546a0f2b710c27d

    • SHA256

      2a041ed8b40b0a3228a4965a726c0d5817e4f693ac4cc989f0f8716580046f53

    • SHA512

      0a33277520c6485322c36085ee40b0079976a12080b90493ea1e76a08799a2c80c2efd8cdbf0d1e15b20a592ec91a24ec62ccf6f2a725d0efefd93455405627a

    • SSDEEP

      24576:MsP3gEmkXsrTpVdJdYJkO2pgTFC2kfOzTePapFNI09w1Q49OjZG:MWsrTTiMR2kfOQOLIsw1QTG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks