General

  • Target

    Payment Ref MT 103 #45980238001.exe

  • Size

    551KB

  • Sample

    200709-p99vhg29bx

  • MD5

    4a529abd1165507b2d18064fa1f1769e

  • SHA1

    921df754e0ecd947b14a8b00af445ca566e6cd46

  • SHA256

    9169d246ccab4d7206fd3a6d294c628d1e9b8ed33329cc025170f546a7c5671e

  • SHA512

    9747c561bed5b2377a7596c7fe159d077143b40ecd8439d5af81d132cadfefd0b9cf7011941e271d6ccc7549e0379252ffcd91cb90d60aea8588934c2df2fe0b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.chaikistomato.us
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MNAKJus@1k2

Targets

    • Target

      Payment Ref MT 103 #45980238001.exe

    • Size

      551KB

    • MD5

      4a529abd1165507b2d18064fa1f1769e

    • SHA1

      921df754e0ecd947b14a8b00af445ca566e6cd46

    • SHA256

      9169d246ccab4d7206fd3a6d294c628d1e9b8ed33329cc025170f546a7c5671e

    • SHA512

      9747c561bed5b2377a7596c7fe159d077143b40ecd8439d5af81d132cadfefd0b9cf7011941e271d6ccc7549e0379252ffcd91cb90d60aea8588934c2df2fe0b

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks