General

  • Target

    order1.exe

  • Size

    673KB

  • Sample

    200709-4yxk1w6lzs

  • MD5

    9645d5c96aad3d907d251b17174b8f7d

  • SHA1

    5f76321846fdbedbd45abdb8928cf9614f3eb666

  • SHA256

    fb257efdf56f0513106558a04bc49ef5d35059d9613dcf690f1d9bcb7edb452b

  • SHA512

    292735c2c523b070980de779fe03cbcaa71c937a8b8ba6f8908c07b4d92bb2d7de8328ef2b8c16e7f30c118d2019c91aeac9c7eff0eb2d91385db6d75ac3dcad

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cjcurrent.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    n,gmAXEv+C*Q

Targets

    • Target

      order1.exe

    • Size

      673KB

    • MD5

      9645d5c96aad3d907d251b17174b8f7d

    • SHA1

      5f76321846fdbedbd45abdb8928cf9614f3eb666

    • SHA256

      fb257efdf56f0513106558a04bc49ef5d35059d9613dcf690f1d9bcb7edb452b

    • SHA512

      292735c2c523b070980de779fe03cbcaa71c937a8b8ba6f8908c07b4d92bb2d7de8328ef2b8c16e7f30c118d2019c91aeac9c7eff0eb2d91385db6d75ac3dcad

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks