General

  • Target

    invoice.exe

  • Size

    790KB

  • Sample

    200707-85n3r9xvl6

  • MD5

    17a7310d17d72b264cbb9f216ebaedc5

  • SHA1

    2de56901f9898e71135327620c2618c1fbff6c1c

  • SHA256

    7f42d837b15c2f7ef2e2fb062381770bd7913f7f4621fb9bec7bfffbb410b5e3

  • SHA512

    73c846fee6dce722d423d854d618c5850e278eadf5b853f7805a512d8a30fe0e4107d4a8f069aff1939306ff3ce259d6643a3e5f1c956fb3c6fb6873e7794622

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.serviciocitroen.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    FXO]%cdB8gx-

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.serviciocitroen.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    FXO]%cdB8gx-

Targets

    • Target

      invoice.exe

    • Size

      790KB

    • MD5

      17a7310d17d72b264cbb9f216ebaedc5

    • SHA1

      2de56901f9898e71135327620c2618c1fbff6c1c

    • SHA256

      7f42d837b15c2f7ef2e2fb062381770bd7913f7f4621fb9bec7bfffbb410b5e3

    • SHA512

      73c846fee6dce722d423d854d618c5850e278eadf5b853f7805a512d8a30fe0e4107d4a8f069aff1939306ff3ce259d6643a3e5f1c956fb3c6fb6873e7794622

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks