General

  • Target

    bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95

  • Size

    4.5MB

  • Sample

    250114-cayc8atkbs

  • MD5

    84f2ddec7d3b7621f02776ad79b64e61

  • SHA1

    b9fa3a3dabd8d64b958d8902f0bc77dd1d2385b8

  • SHA256

    bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95

  • SHA512

    8242bdff6dac52cc4773b19b1928fd6792f99956760dc17d563394b573c0d81ef4349d1924bb4147d5425da9a558c54665e2de5eb9dd18669c8c0e8aff72aab6

  • SSDEEP

    49152:VZ4I/q2ksAuo5UonKzwjHP7iF0u3xl9hCY:DzXksFfoK8z7/aVD

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @Mexico1.,

Targets

    • Target

      bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95

    • Size

      4.5MB

    • MD5

      84f2ddec7d3b7621f02776ad79b64e61

    • SHA1

      b9fa3a3dabd8d64b958d8902f0bc77dd1d2385b8

    • SHA256

      bd557b12ae1380c61a6bb5c5edefa17b62463d918928fb0c884d1a55a70dbd95

    • SHA512

      8242bdff6dac52cc4773b19b1928fd6792f99956760dc17d563394b573c0d81ef4349d1924bb4147d5425da9a558c54665e2de5eb9dd18669c8c0e8aff72aab6

    • SSDEEP

      49152:VZ4I/q2ksAuo5UonKzwjHP7iF0u3xl9hCY:DzXksFfoK8z7/aVD

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks