General

  • Target

    c84693b4a478de08b400a4acef57303dbf75d4d7800ed0c44a478ed4ee967ca7

  • Size

    1.5MB

  • Sample

    250114-b812bstjfv

  • MD5

    e7c0cec033495b350b70271de9a127c1

  • SHA1

    9759f386b7721a10b84212ee4ec4b91c0e3b1ba6

  • SHA256

    c84693b4a478de08b400a4acef57303dbf75d4d7800ed0c44a478ed4ee967ca7

  • SHA512

    4652ed69f047a585017ce710ecd044346e3ac4d7cb159adba9246a2520fbad0f7395d83f0ebe0b4148b140775731a2ba192f7f0707b2add9d90072175c8b49d6

  • SSDEEP

    24576:z1/HEFP4BEb2fxuMq0fqv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:zVqSkmxu56ijLoyEkmZ9Y14

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.swarnford.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    F!go#456

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      c84693b4a478de08b400a4acef57303dbf75d4d7800ed0c44a478ed4ee967ca7

    • Size

      1.5MB

    • MD5

      e7c0cec033495b350b70271de9a127c1

    • SHA1

      9759f386b7721a10b84212ee4ec4b91c0e3b1ba6

    • SHA256

      c84693b4a478de08b400a4acef57303dbf75d4d7800ed0c44a478ed4ee967ca7

    • SHA512

      4652ed69f047a585017ce710ecd044346e3ac4d7cb159adba9246a2520fbad0f7395d83f0ebe0b4148b140775731a2ba192f7f0707b2add9d90072175c8b49d6

    • SSDEEP

      24576:z1/HEFP4BEb2fxuMq0fqv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:zVqSkmxu56ijLoyEkmZ9Y14

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks