General

  • Target

    OrderPO202501164214_1.zip

  • Size

    1013KB

  • Sample

    250328-qszkwswxgt

  • MD5

    e2cdb327564f4c16093786927ecd88a2

  • SHA1

    b78a0aadd1e327dc76c0250b84ea43eacb776310

  • SHA256

    2e79a1944328468eeed0bbf560ec3dec59012afc623f33d56fa3a71b82806a2f

  • SHA512

    6d64f7a2ff78e892fdc9a352a165cb4df2e55e0462ef45b1948cc55da2bba454022b14aff0c8abd1fc7d9056ee270ee6068972aee74393487ea6150233a325aa

  • SSDEEP

    24576:kuYGswU5Ti8MEvdohSZDB9jFevu0nG8Mjpahs+RpVFPPm4ms5Mx4D:kuYGUu8MEth6uWzsapVVPmA84D

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.iaa-airferight.com
  • Port:
    587
  • Username:
    admin@iaa-airferight.com
  • Password:
    manlikeyou88
  • Email To:
    admin@iaa-airferight.com

Targets

    • Target

      Rwlleacvff.exe

    • Size

      1.1MB

    • MD5

      d4b61b8225bba66d44e311d686014ecf

    • SHA1

      4df6fc35a76fa2bb71ad182a77881e8868b1d00b

    • SHA256

      ec52c66f567af3f66c74f28a63cd2c315646a34095efc933de90151ed7df9684

    • SHA512

      79f9c98d0c1e20290e274d6702bc3d4c617102097562b26a0d4f6101463ff501b7218d188ba45ada9cd5c776070084510ef17f7e72185f31f66155690f3b9d78

    • SSDEEP

      24576:6Uu7IVSXJ7gIYeEPdoh8/D39jFSNq0/7xMjp8xs+XpVHPpm4m8dL:6sNeEhVCq67LsOpVvpmY1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.