General

  • Target

    4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde

  • Size

    773KB

  • Sample

    240522-bnfjwsfh5y

  • MD5

    3008d929bd31e9311eb2e3c193ecc032

  • SHA1

    18208890d26551c15479033a8143156d133966ca

  • SHA256

    4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde

  • SHA512

    5ee636c57f28cef8356468e9b13543e9242ea627983b736115b03965eac73ad168dc723db9a04b6950af942daf521c1db11727aa0a0be3d6d8109ce37fac4c13

  • SSDEEP

    12288:hsFbsfI8Z1gMFVobi/Wp4LC2op1w97Kihz6BxZfZLkHPqCJiV17/yeiGdDr:h0bsfI6dFqbR1w97T2FZLkvq3Dr

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    xxtovlhjahfikslt

Targets

    • Target

      4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde

    • Size

      773KB

    • MD5

      3008d929bd31e9311eb2e3c193ecc032

    • SHA1

      18208890d26551c15479033a8143156d133966ca

    • SHA256

      4575f34cefb356938eed8e9591a627b429c5d5badd0755b1b6bf54750af16fde

    • SHA512

      5ee636c57f28cef8356468e9b13543e9242ea627983b736115b03965eac73ad168dc723db9a04b6950af942daf521c1db11727aa0a0be3d6d8109ce37fac4c13

    • SSDEEP

      12288:hsFbsfI8Z1gMFVobi/Wp4LC2op1w97Kihz6BxZfZLkHPqCJiV17/yeiGdDr:h0bsfI6dFqbR1w97T2FZLkvq3Dr

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks