General

  • Target

    Statement of account 06 20_pdf.exe

  • Size

    841KB

  • Sample

    200707-z9bl8wphq6

  • MD5

    cf36c9116111d2a83722602bdcdf37b9

  • SHA1

    296d1aa1435da3ed555ac5368988251f078e962e

  • SHA256

    f1634e4db9eba49ff284640fdb8348e96a95267d1759346f078d9144f97f8aff

  • SHA512

    cf6063feeabf72ebf54e7c341b67d52c2f59b7ed5c295e03ab7c56ff7b51a2b342077dba730dac2b7b243f3f8069149aade36249164fefb7a817e3e0493a1590

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ionos.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    temp20182019

Targets

    • Target

      Statement of account 06 20_pdf.exe

    • Size

      841KB

    • MD5

      cf36c9116111d2a83722602bdcdf37b9

    • SHA1

      296d1aa1435da3ed555ac5368988251f078e962e

    • SHA256

      f1634e4db9eba49ff284640fdb8348e96a95267d1759346f078d9144f97f8aff

    • SHA512

      cf6063feeabf72ebf54e7c341b67d52c2f59b7ed5c295e03ab7c56ff7b51a2b342077dba730dac2b7b243f3f8069149aade36249164fefb7a817e3e0493a1590

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks