General

  • Target

    d3084c4af4ed34ed12024e2502f68568.exe

  • Size

    794KB

  • Sample

    200707-1k7xjac9wa

  • MD5

    d3084c4af4ed34ed12024e2502f68568

  • SHA1

    01db56ec2bfdf5e7b0602e1cf242a6fda1c5f289

  • SHA256

    0174855748327565798fbf78c2b4b306257c1bd4ec7eeb6b62922d0561191377

  • SHA512

    df9c4bc86bd272ef95b653060a3186f67069ef1316d9a90c57036899dbce8f10ac1c3296f90bc975861c3b07829b27c1c9aaecbfdccf8fedc3b3898f4de1a4ca

Malware Config

Targets

    • Target

      d3084c4af4ed34ed12024e2502f68568.exe

    • Size

      794KB

    • MD5

      d3084c4af4ed34ed12024e2502f68568

    • SHA1

      01db56ec2bfdf5e7b0602e1cf242a6fda1c5f289

    • SHA256

      0174855748327565798fbf78c2b4b306257c1bd4ec7eeb6b62922d0561191377

    • SHA512

      df9c4bc86bd272ef95b653060a3186f67069ef1316d9a90c57036899dbce8f10ac1c3296f90bc975861c3b07829b27c1c9aaecbfdccf8fedc3b3898f4de1a4ca

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks