General

  • Target

    ZDQzOihuM7tYo0E.exe

  • Size

    566KB

  • Sample

    200709-kak416rlcn

  • MD5

    6d0a9aac6b0367efc965dc0f8eee7b56

  • SHA1

    d6bb418c0d5660f5f643685dd245f31b60eefe7e

  • SHA256

    8d67869517928418745bb57e58346ecfdd2af3321e13517159c292d159cc8dd1

  • SHA512

    010ed80a2429ec375e1288d75a4fba97d4cf67029b4772ed7710f139c57bbd84cdad205aa6c5583265f9553042874963a571eeac58e7745b5395935011758459

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    stark123@@@

Targets

    • Target

      ZDQzOihuM7tYo0E.exe

    • Size

      566KB

    • MD5

      6d0a9aac6b0367efc965dc0f8eee7b56

    • SHA1

      d6bb418c0d5660f5f643685dd245f31b60eefe7e

    • SHA256

      8d67869517928418745bb57e58346ecfdd2af3321e13517159c292d159cc8dd1

    • SHA512

      010ed80a2429ec375e1288d75a4fba97d4cf67029b4772ed7710f139c57bbd84cdad205aa6c5583265f9553042874963a571eeac58e7745b5395935011758459

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks