General

  • Target

    38e3fbfe-0244-439b-334c-08dcf3dd22d2.zip

  • Size

    58KB

  • Sample

    241028-fy43fssapk

  • MD5

    b9519bb0ee97b19bd39154509346dd05

  • SHA1

    71b469bbd2ec77f10d6f7d520da29844eae10249

  • SHA256

    6fd9e1615f35936de97c300f336f368a0e1798638292f8a9dcbaa7df39a66687

  • SHA512

    d036669d5b8f76793b3aed802beebf6d1875a867c1907921dd434ea283c98583b42b5c7f5be98b76da125c5852035b02f7f5ca55b80fd49595ee9c7287609b1a

  • SSDEEP

    1536:KwrQmWGWCvcnunt16d01SHsVuYpIPJn8h78:KwJWGXviq9cEuYWPl8R8

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    marcellinus360

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      RFQ-CanparFFTradingCo..js

    • Size

      180KB

    • MD5

      0d3505de58b29682da0f4799e7812306

    • SHA1

      9a411ead4bdbed963fdbaafd5729a77a35e63e66

    • SHA256

      11d08c101934f51cee60658bbeb71a5988873bfacba3c00f25cea0bd67442926

    • SHA512

      c037fef1c0ccb0fff448d0d2344c3edfc2613529ee04133a44b29ed111df9ded4b79f57057edc02c230c68827a0d2b3b1ea3f32f6ce583dd80c61a81b064ef90

    • SSDEEP

      3072:94SWDYRx3twtUMy2xtn4BRGLGqlT6HYlxKm3+FmEM5SGDZx392xtn4BRGLGqlhG:xWAx3R4t4BRgjR64lIm3a1ZGdx394t4V

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks