General

  • Target

    Quotation.exe

  • Size

    665KB

  • Sample

    200708-zhs3m3lkms

  • MD5

    23d87ff513747459238551157eb4e4c3

  • SHA1

    867d658600f1c5c1bc8a2c1786fda5ea182c681f

  • SHA256

    13444c52c094b2067a66767847b8a2151da087a99c9391a2547a53a3e4de7056

  • SHA512

    d5437a2d691b5b7aa5305b98bd004089499e7c1e60c25a9740eb2c0a808738e5f18aa6809822bbd1a9438c194265087fa767c0fc0d1687e334a65d676af8cae3

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    babacj1234567890

Targets

    • Target

      Quotation.exe

    • Size

      665KB

    • MD5

      23d87ff513747459238551157eb4e4c3

    • SHA1

      867d658600f1c5c1bc8a2c1786fda5ea182c681f

    • SHA256

      13444c52c094b2067a66767847b8a2151da087a99c9391a2547a53a3e4de7056

    • SHA512

      d5437a2d691b5b7aa5305b98bd004089499e7c1e60c25a9740eb2c0a808738e5f18aa6809822bbd1a9438c194265087fa767c0fc0d1687e334a65d676af8cae3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks