General

  • Target

    adfe0496d518f92b70dd4eb230d7714d727a0b9233ea1483c5997870e393f36d

  • Size

    1.1MB

  • Sample

    240521-bz3hssdh94

  • MD5

    a3375f664cf5d9c193248611917cb778

  • SHA1

    2add0d19b0d752fae76dc01878fdae33c3e48bac

  • SHA256

    adfe0496d518f92b70dd4eb230d7714d727a0b9233ea1483c5997870e393f36d

  • SHA512

    2bcdbef82b16244f5225db0763f6d1131da2694f630c25ec4f60b0fa624033d7cb99b2b368068f8460ae2c51651865f8b56426dbfb381fc0c40599450f2f7741

  • SSDEEP

    12288:CU9jA6JPQbRhkYvg86stzDpi4L3HIb66KWlyaixaWNVLCj3aVRQWC7vL/UMvwIRG:bbsPTL3HIb66rX65CLSRQLsAwI

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    premium161.web-hosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    London@1414

Targets

    • Target

      adfe0496d518f92b70dd4eb230d7714d727a0b9233ea1483c5997870e393f36d

    • Size

      1.1MB

    • MD5

      a3375f664cf5d9c193248611917cb778

    • SHA1

      2add0d19b0d752fae76dc01878fdae33c3e48bac

    • SHA256

      adfe0496d518f92b70dd4eb230d7714d727a0b9233ea1483c5997870e393f36d

    • SHA512

      2bcdbef82b16244f5225db0763f6d1131da2694f630c25ec4f60b0fa624033d7cb99b2b368068f8460ae2c51651865f8b56426dbfb381fc0c40599450f2f7741

    • SSDEEP

      12288:CU9jA6JPQbRhkYvg86stzDpi4L3HIb66KWlyaixaWNVLCj3aVRQWC7vL/UMvwIRG:bbsPTL3HIb66rX65CLSRQLsAwI

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks