General

  • Target

    SCAN_PO CTL209-026.exe

  • Size

    839KB

  • Sample

    200708-ehq1hp78en

  • MD5

    0957144bc6ea160515c1bfd6c2faa6d5

  • SHA1

    e06dfa469646bc8cc28207abe7c8cb8116ab77e6

  • SHA256

    9a461345aa76acd802aebd2426775b952f411c0c1def2ae141f23fe4a16b5e7c

  • SHA512

    15d4bcfe795bc5eadd2909427acfce5e713b2a0d4402aa0d88d49f8880298a2c12407ce8c5a1f23b84c6405ca14f2dbc30ae7c464d983563c1c5e9959e5a6010

Malware Config

Targets

    • Target

      SCAN_PO CTL209-026.exe

    • Size

      839KB

    • MD5

      0957144bc6ea160515c1bfd6c2faa6d5

    • SHA1

      e06dfa469646bc8cc28207abe7c8cb8116ab77e6

    • SHA256

      9a461345aa76acd802aebd2426775b952f411c0c1def2ae141f23fe4a16b5e7c

    • SHA512

      15d4bcfe795bc5eadd2909427acfce5e713b2a0d4402aa0d88d49f8880298a2c12407ce8c5a1f23b84c6405ca14f2dbc30ae7c464d983563c1c5e9959e5a6010

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks