General

  • Target

    5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214

  • Size

    683KB

  • Sample

    250110-bs68eayrcm

  • MD5

    a3fd394b9b762ab43abb39b1a5b446cc

  • SHA1

    f093b17b78f7006e7d4a141a4c458bd1edbb484b

  • SHA256

    5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214

  • SHA512

    1318ddd4aa37569781dea8aa0c255850ea2fb8338027cf91fc96df995dfca930a42d8df701b7110e9ff5ed7a04bdee06f6f98c3e2fa64a5ae011a2ad7cc30772

  • SSDEEP

    6144:iDW1ow4tsJ6vI7/+FK8xvfz1BmTlKkkoHq6EqZmBhk0xHM9C4y:iiuI7/+1xpBmtHIQ6htK9CT

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @infinitY1234

Targets

    • Target

      5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214

    • Size

      683KB

    • MD5

      a3fd394b9b762ab43abb39b1a5b446cc

    • SHA1

      f093b17b78f7006e7d4a141a4c458bd1edbb484b

    • SHA256

      5f9f0e53fa5299fa4c4216599552a09f2716980e5b93c2b2f44d733edae22214

    • SHA512

      1318ddd4aa37569781dea8aa0c255850ea2fb8338027cf91fc96df995dfca930a42d8df701b7110e9ff5ed7a04bdee06f6f98c3e2fa64a5ae011a2ad7cc30772

    • SSDEEP

      6144:iDW1ow4tsJ6vI7/+FK8xvfz1BmTlKkkoHq6EqZmBhk0xHM9C4y:iiuI7/+1xpBmtHIQ6htK9CT

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • System Binary Proxy Execution: InstallUtil

      Abuse InstallUtil to proxy execution of malicious code.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks