General

  • Target

    promise cripted.exe

  • Size

    459KB

  • Sample

    200707-zdt5yhp2xs

  • MD5

    5e5769b61d855338e115f91ec350d27d

  • SHA1

    a0a32e969872a3548a171abe78223d2b44061ff3

  • SHA256

    21d19ba98de8b710605e144809cae73bc3b7606cfc49e995a267cf44e4c2638f

  • SHA512

    b913b5ffedcab3db0bae22127ee6e8aab511327ebe9562ec47392af9b4c5dd9b13230b83ad8c82e5cad2bc27f1e20e27bc804ef87c9dda6f2403ee8ea3faa4fe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.insooryaexpresscargo.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    GuG5GK(3m7*Z

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.insooryaexpresscargo.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    GuG5GK(3m7*Z

Targets

    • Target

      promise cripted.exe

    • Size

      459KB

    • MD5

      5e5769b61d855338e115f91ec350d27d

    • SHA1

      a0a32e969872a3548a171abe78223d2b44061ff3

    • SHA256

      21d19ba98de8b710605e144809cae73bc3b7606cfc49e995a267cf44e4c2638f

    • SHA512

      b913b5ffedcab3db0bae22127ee6e8aab511327ebe9562ec47392af9b4c5dd9b13230b83ad8c82e5cad2bc27f1e20e27bc804ef87c9dda6f2403ee8ea3faa4fe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks