General

  • Target

    3cb174f4e9e4b44c8360597692bc259c.zip

  • Size

    394KB

  • Sample

    240831-qkcq6awajb

  • MD5

    5adff8d8b793febed1194c1fd13e857d

  • SHA1

    c44ae373d7329350d4650c63e10795cea8c9813e

  • SHA256

    1916e9886eb9eec0ed025f5741e05f5e25f2e3a92a739f133c6d980043d46e00

  • SHA512

    da823b005976655e7af21323ea0d2b9cab9c83a30ada8853e41c9a99b79e0bf150e4e3279dccd57ba5960b747988957cb8303f213ea20b91b31cd2175da73779

  • SSDEEP

    12288:ORl35uk++TWb2VgKM9JwCPECYjpUvXWSrjsE:qh5F7TWb/qkEzUvGSrjsE

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ValSta@34zzz

Targets

    • Target

      8bc8b49458d5fb7d228bb2541189e2de7122f6819087c7eb00fcf215bdcaf7c7

    • Size

      455KB

    • MD5

      3cb174f4e9e4b44c8360597692bc259c

    • SHA1

      723d56d0072e09eafe242c050a9f0cc422b92ee0

    • SHA256

      8bc8b49458d5fb7d228bb2541189e2de7122f6819087c7eb00fcf215bdcaf7c7

    • SHA512

      00a382f11ff2ceaf7de3555597a95a1faa8a2cb78f7c8fe461db1dee9f1c93ad4a2e47bc071ae5d819006246e62405d2f1f153457bab84bf5f1cb748e5d7075c

    • SSDEEP

      6144:bdcZ430nBPewKZ50Qg/gypH8sh1CHreDbUL4Vp/RX6F/937MwY0uUYY0SA:bdKswKZCQgoKHvCreDbULORqZtMwYb7

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks